Password Spraying Attack Detection

AuthenticationAttacks Multi-Platform Password Spraying

What This Means

Detect password spraying attacks across your authentication infrastructure. Learn the patterns that distinguish spraying from brute force and how to protect against this stealthy attack technique.

Example Log

-- Windows Event 4625 pattern showing password spraying:
Event 4625: Account Name: jsmith    Source IP: 203.0.113.50   Time: 14:22:01
Event 4625: Account Name: mwilson   Source IP: 203.0.113.50   Time: 14:22:03
Event 4625: Account Name: klee      Source IP: 203.0.113.50   Time: 14:22:05
Event 4625: Account Name: dgarcia   Source IP: 203.0.113.50   Time: 14:22:07
Event 4625: Account Name: tchen     Source IP: 203.0.113.50   Time: 14:22:09
-- Note: Only 1 attempt per account (avoids lockout threshold)

Indicators of Suspicious Activity

How to Investigate

  1. Aggregate failed logons by source IP across all accounts over a sliding time window
  2. Look for single-failure-per-account patterns (the hallmark of password spraying)
  3. Check if any targeted accounts subsequently had a successful logon from the same source
  4. Review the targeted account list for patterns (alphabetical, same OU, specific roles)
  5. Correlate across authentication protocols — attackers may spray NTLM, Kerberos, and web apps
  6. Check Azure AD sign-in logs if hybrid identity is in use

Recommended Mitigations

Scan This Log Instantly

Paste a suspicious log line below and get an instant AI-powered security assessment.

0 / 2000

Need a Full Investigation?

Scan entire log files, detect attack patterns, reconstruct timelines, and generate a full investigation report.

Run Smart Scan

Related Log Types

Related Attack Patterns

Frequently Asked Questions

How is password spraying different from brute force?
Brute force tries many passwords against one account. Password spraying tries one or two passwords against many accounts. Spraying avoids lockout thresholds by staying under the attempt limit per account.
Why is password spraying hard to detect?
Each individual account sees only 1-2 failures, which looks like a normal typo. The attack is only visible when you aggregate failures across all accounts by source IP or by time window.
What passwords do attackers spray?
Attackers use commonly chosen passwords like Season+Year (Summer2026!), company name variations, Password1!, Welcome1, and other patterns from leaked password databases.