Security Reports
Security Reports gives you a visual summary of Authica security activity over a selected time range.
Instead of reviewing individual log entries one by one, this page groups recent events into charts, totals, and ranked lists. This helps you quickly understand attack volume, failed login activity, top event types, most active countries, most active IPs, and commonly targeted usernames.
Security Reports depends on Authica logging. If logging is disabled, reports may not have enough data to display.

Country Note
Country-based reports work best when:
– Your site is behind Cloudflare
– The DNS record is using the orange-cloud proxy
– Cloudflare is sending the CF-IPCountry header
If your site is not behind Cloudflare, Authica can still report events and IPs, but country data may be unavailable or incomplete.
Add Widget to Dashboard
This option controls whether the Security Reports widget appears on the Authica Dashboard.
When enabled, Authica shows a compact reports widget on the dashboard so you can review security trends without opening the full Reports page.
Recommended setting: Enabled.
Use this if you want quick visibility into recent security activity from the main Authica Dashboard.
Date Range
The date range dropdown controls which period the report should analyze.
Common range options may include:
– Today
– Last 24 hours
– Last 7 days
– Last 30 days
– Custom
Use shorter ranges when investigating recent activity. Use longer ranges when reviewing trends over time.
Update Button
The Update button refreshes the report using the currently selected date range.
Use this after changing the range dropdown or when you want to reload the latest available data.
Recommended usage:
1. Select the desired range.
2. Click Update.
3. Review the updated totals, charts, and ranked lists.
Summary Cards
The summary cards at the top provide a quick overview of the selected reporting period.
Total Events
The Total Events card shows the total number of Authica log events in the selected range.
This includes all counted events for the selected period, depending on your logging configuration.
Use this number to understand overall security activity volume.
Incidents
The Incidents card shows how many events were considered incident-style or security-relevant.
This helps separate more important security events from general activity.
A high incident count may indicate repeated attacks, login abuse, blocked IP activity, or other suspicious patterns.
Failed Logins
The Failed Logins card shows how many failed login events occurred during the selected range.
This is useful for tracking password guessing, brute-force attempts, or users having trouble signing in.
If failed logins are high, review:
– Brute Force Protection
– Username Protection
– IP Restriction
– Recent Activity details
Unique IPs
The Unique IPs card shows how many different IP addresses appeared in the report data.
This helps you understand whether activity is concentrated from a few sources or spread across many IPs.
A high unique IP count may indicate distributed bot activity.
Report Charts and Lists
The report cards below the summary show more detailed breakdowns.
Event Volume Over Time
The Event Volume Over Time chart shows how many events occurred on each day in the selected date range.
Use this chart to identify spikes in activity.
A sudden increase may indicate:
– A brute-force wave
– More blocked IPs
– Bot scanning
– A targeted attack period
– Increased legitimate login traffic
When a spike appears, use Recent Activity with the same date range to inspect the individual events.
Severity Mix
The Severity Mix card groups events by severity level.
This helps you quickly understand how serious the recorded activity was.
Top Countries
The Top Countries card shows which country codes appeared most often in the selected report data.
This helps you understand where security events appear to originate.
Use this card when reviewing:
– GEO Access rules
– Suspicious regions
– Unexpected login activity
– Country-based attack patterns
Important: Country data is most accurate when your site is behind Cloudflare proxy and CF-IPCountry is available.
Top IPs
The Top IPs card shows the IP addresses with the most activity in the selected reporting period.
This is one of the most useful report cards for security review.
Use it to identify:
– Repeated attack sources
– IPs that may need blocking
– IPs triggering repeated login failures
– IPs already handled by IP Restriction or Brute Force Protection
After identifying a suspicious IP, search for it in Recent Activity to see the full event history.
Most Targeted Usernames
The Most Targeted Usernames card shows which usernames were most often involved in suspicious or failed-login activity.
Use this card to identify usernames that bots or attackers are trying.
This is especially useful with Username Protection.
Recommended action:
Add commonly attacked or sensitive usernames to Username Protection when appropriate.
If a real administrator username appears here repeatedly, review your username exposure, author slugs, and 2FA settings.
Scrollable Report Cards
Some report cards can contain more entries than are visible at once.
Cards such as:
– Top Event Types
– Top Countries
– Top IPs
– Most Targeted Usernames
May be scrollable while keeping the card size consistent.
Use the scrollbar inside the card to review additional entries.
Recommended Workflow
A good way to use Security Reports is:
1. Select the date range.
2. Click Update.
3. Review Total Events, Incidents, Failed Logins, and Unique IPs.
4. Check Event Volume Over Time for spikes.
5. Review Severity Mix to understand risk level.
6. Check Top IPs and Most Targeted Usernames.
7. Open Recent Activity to investigate specific IPs, usernames, or dates.
8. Adjust Authica protections if needed.
Recommended Usage
For routine review:
Range: Last 7 days
Review: Total Events, Failed Logins, Top IPs, Most Targeted Usernames
For incident investigation:
Range: Custom
Focus: Event Volume Over Time, Severity Mix, Top IPs, Top Event Types
For GEO review:
Focus on Top Countries and Recent Activity country filters
Best Practices
Recommended best practices:
– Keep logging enabled so reports have data
– Add the reports widget to the dashboard for quick visibility
– Review spikes in Event Volume Over Time
– Investigate repeated IPs in Top IPs
– Watch Most Targeted Usernames for exposed or sensitive usernames
– Use Recent Activity for detailed event investigation
– Keep Cloudflare proxy enabled if you want country-aware reports
Security Reports are most useful when reviewed regularly, not only after a problem happens.
Important Notes
Security Reports are based on stored Authica log data.
If logs are reset, disabled, or trimmed by retention settings, report data may be reduced.
Country reporting depends on available country data. For best results, use Cloudflare orange-cloud proxy so Authica can receive country information through the CF-IPCountry header.