Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How do you handle credential stuffing? Attackers will use a huge number of regular residential IPs or VPNs that you would expect to see logins from. How do you tell a credential stuff from a regular login? They are both coming from unknown IPs with normal login rates and they have valid credentials.


Because there’s a bit more to it than just tracking IPs and rates.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: