How to use it
Step 1
Look up the alert IP
Use the exact source value recorded by your auth system.
Step 2
Compare against account history
Review whether the country, city, or provider is consistent with past behavior.
Step 3
Combine with other signals
Use device, MFA, and timestamp context before labeling the login suspicious.