← Back to Explore
sigmahighHunting
Activity From Anonymous IP Address
Identifies that users were active from an IP address that has been identified as an anonymous proxy IP address.
Detection Query
selection:
riskEventType: riskyIPAddress
condition: selection
Author
Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
Created
2023-09-03
Data Sources
azureriskdetection
Platforms
azure
References
Tags
attack.t1078attack.persistenceattack.defense-evasionattack.privilege-escalationattack.initial-access
Raw Content
title: Activity From Anonymous IP Address
id: be4d9c86-d702-4030-b52e-c7859110e5e8
status: test
description: Identifies that users were active from an IP address that has been identified as an anonymous proxy IP address.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#activity-from-anonymous-ip-address
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.t1078
- attack.persistence
- attack.defense-evasion
- attack.privilege-escalation
- attack.initial-access
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'riskyIPAddress'
condition: selection
falsepositives:
- We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
level: high