Browse high-level activity metrics to keep an eye on attacks in progress or look for malicious activity.
Drill into malicious activity. Uncover new attacks and create a plan for how to mitigate.
All user activity
in one place
User activity in Castle is enriched with IP address, UA, email, phone, and device fingerprint. In addition, risk score and risk signals are also included.