xultech / auth-log-notification
Log user authentication events and send login alerts via Mailable and Notification.
Requires
- php: ^8.1
- illuminate/support: ^9.0|^10.0|^11.0|^12.0
- jenssegers/agent: ^2.6
- laravel/slack-notification-channel: ^3.5
- laravel/vonage-notification-channel: ^3.3
- torann/geoip: ^3.0
Requires (Dev)
- illuminate/auth: ^9.0|^10.0|^11.0|^12.0
- illuminate/config: ^12.1
- illuminate/cookie: ^12.2
- illuminate/database: ^12.1
- illuminate/events: ^12.2
- illuminate/hashing: ^12.2
- illuminate/http: ^12.1
- illuminate/mail: ^12.1
- illuminate/notifications: ^12.1
- mockery/mockery: ^1.6
- pestphp/pest: ^3.7
README
A Laravel package for tracking authentication activity, detecting suspicious logins, and notifying users in real time via Mail, Slack, or SMS.
It logs login, logout, and failed attempts, adds device and location awareness, supports session fingerprinting, rate limiting, and integrates seamlessly with your existing authentication flow.
Features
- β Tracks login, logout, failed login, and re-authentication events
- π Detects IP address, device type, browser, and geolocation
- π Sends real-time login alerts via Mail, Slack, and SMS (Vonage)
- π§ Detects suspicious logins based on device, IP, and location history
- π Supports session fingerprinting to detect hijacked sessions
- π« Applies rate limiting and temporary lockouts for failed login attempts
- 𧩠Allows custom hook execution on auth events
- π Includes Blade components for login/session insights
- π§Ό Artisan commands for log cleanup and geo-location syncing
- π Easily integrates with existing User models via a trait
- π§ Fully configurable and extendable
Installation
You can install the package via Composer:
composer require xultech/auth-log-notification
The package uses Laravel's auto-discovery, so no additional configuration is needed for Laravel 5.5 and above.
If you're using Laravel below 5.5, youβll need to manually register the service provider in config/app.php:
'providers' => [ // ... Xultech\AuthLogNotification\AuthLogNotificationServiceProvider::class, ],
Before you begin to use this package ensure you have published the GeoIP config package. You can find the details about how to do this at Torann/laravel-geoip
Configuration
To publish the configuration file, run:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-config"
This will create a file at:
config/authlog.php
Available Configuration Options
π enabled
Enable or disable the entire package globally.
'enabled' => true,
ποΈ log_events
Control which authentication events should be logged.
'log_events' => [ 'login' => true, 'logout' => true, 'failed_login' => true, 'password_reset' => false, 're-authenticated' => false, ],
π£ notification
Configure how users should be notified about login events.
'notification' => [ 'channels' => ['mail'], // Supports: mail, slack, nexmo (SMS) 'mode' => 'notification', // 'notification' or 'mailable' 'only_on_suspicious_activity' => true, 'channels_config' => [ 'mail' => [ 'enabled' => true, 'template' => 'authlog::mail.login-alert', ], 'slack' => [ 'enabled' => false, 'channel' => '#alerts', ], 'nexmo' => [ 'enabled' => false, 'phone_field' => 'phone', ], ], ],
π© default_notification
Override default values used for notification channels.
'default_notification' => [ 'subject' => 'New Login Detected', 'slack_channel' => '#security-alerts', 'mail_from' => env('MAIL_FROM_ADDRESS', 'no-reply@example.com'), 'mail_view' => 'authlog::mail.login-alert', ],
π§ device_detection
Enable device tracking, user-agent, and metadata storage.
'device_detection' => [ 'enabled' => true, 'store_user_agent' => true, 'store_device_metadata' => true, ],
π location_detection
Control geo-location detection settings.
'location_detection' => [ 'enabled' => true, 'driver' => 'torann/geoip', 'store_metadata' => true, 'strict' => false, ],
𧬠session_tracking
Enable session tracking and fingerprint validation.
'session_tracking' => [ 'enabled' => true, 'generate_session_id' => true, 'enforce_single_session' => false, 'fingerprint' => [ 'enabled' => true, 'store_in_session' => true, 'validate_on_request' => false, ], 'session_fingerprint' => [ 'enabled' => true, 'validate_on_request' => true, 'abort_on_mismatch' => true, 'redirect_to' => '/login', 'notify_user' => true, 'notify_admins' => [ 'emails' => ['admin@example.com'], 'slack_webhooks' => [ // Add your Slack webhook URLs here ], ], ], ],
β whitelisted_ips
List of IPs that will never trigger alerts or be flagged.
'whitelisted_ips' => [ '127.0.0.1', '::1', ],
π‘οΈ security_thresholds
Thresholds to detect brute-force and location change behavior.
'security_thresholds' => [ 'failed_attempts_before_alert' => 3, 'alert_on_geo_change' => true, 'cooldown_minutes' => 3, ],
π§Ό retention
Control log retention and cleanup behavior.
'retention' => [ 'enabled' => true, 'days' => 90, 'delete_method' => 'soft', // Options: 'soft', 'hard' ], 'auto_cleanup' => true,
π hooks
Bind custom callbacks or listeners to authentication events.
'hooks' => [ 'on_login' => null, 'on_logout' => null, 'on_failed' => null, ],
π οΈ admin
Optional admin view configuration (for future support or custom use).
'admin' => [ 'viewer_enabled' => false, 'viewer_route' => '/admin/auth-logs', 'middleware' => ['web', 'auth', 'can:view-auth-logs'], ],
π§ location_service
Customize the geolocation service class.
'location_service' => \Xultech\AuthLogNotification\Services\GeoLocation\GeoLocationService::class,
β οΈ suspicion_rules
Define logic for what counts as a suspicious login and whether to block it
'suspicion_rules' => [ 'new_device' => true, 'new_location' => true, 'block_suspicious_logins' => false, ], 'suspicious_login_handler' => \Xultech\AuthLogNotification\Handlers\SuspiciousLoginHandler::class,
π lockout
Rate limiting and lockout configuration for brute-force protection.
'lockout' => [ 'enabled' => true, 'key_prefix' => 'authlog:lockout:', 'max_attempts' => 5, 'lockout_minutes' => 10, 'track_by' => 'ip', // Options: 'ip', 'email', 'both' 'generic_response' => true, 'redirect_to' => '/login', ],
π middleware_blocking
Configure the middleware that blocks suspicious login attempts before authentication (i.e., on the login route).
'middleware_blocking' => [ // Enable or disable the middleware 'enabled' => true, // The Eloquent model class used to identify the user (e.g., App\Models\User::class) // Use a string, not ::class, for compatibility with package-based environments 'user_model' => 'App\\Models\\User', // The database column used to match the user (e.g., 'email', 'username') 'email_column' => 'email', // The request input key used in your login form (e.g., 'email', 'login', 'identifier') // This should match the input name your users fill out when logging in 'request_input_key' => 'email', ],
This powers the
authlog.block-suspicious
middleware. When enabled, the system checks if the login attempt is from a new device or IP, and blocks the request before authentication if suspicious.
To use it:
Route::post('/login', [LoginController::class, 'store']) ->middleware('authlog.block-suspicious');
This gives you full control over how authentication is monitored, logged, and secured within your Laravel app. Adjust the values to fit your security strategy.
Publishing Assets
This package provides some required and optional assets that can be published into your application for customization.
ποΈ Migrations (Required)
To publish the database migration:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-migrations"
This will copy the migration file to:
database/migrations/xxxx_xx_xx_xxxxxx_create_auth_logs_table.php
Make sure to run:
php artisan migrate
πΌοΈ Views
To customize the email or notification templates, publish the view files:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-views"
View files will be published to:
resources/views/vendor/authlog/
You can edit templates like login-alert.blade.php to match your brand or layout.
𧩠Blade Components
The package provides reusable Blade components. To customize them, publish the components:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-components"
This will publish components like:
<x-authlog:last-login />
<x-authlog:recent-logins />
<x-authlog:suspicious-alert />
<x-authlog:session-count />
These components can be embedded in your dashboard or user profile pages to display session-related information at a glance.
π§ Listeners (Optional)
If you'd like to customize what happens on login/logout/failed/password reset:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-listeners"
This will copy listeners like LoginEventListener
, LogoutEventListener
, etc., into:
app/Listeners/AuthLog/
You can then customize what each event does, such as triggering custom notifications, logging to other tables, or extending tracking logic.
π‘ Events (Optional)
To customize or extend the packageβs custom events:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-events"
This publishes events like ReAuthenticated to:
app/Events/AuthLog/
π Notifications (Optional)
To modify how users are notified when login or suspicious activity occurs:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-notifications"
This copies notification classes (like LoginAlertNotification) into:
app/Notifications/AuthLog/
π‘οΈ Middleware (Optional)
If you want to customize any of the built-in middlewares (rate limiting, session fingerprinting, or blocking suspicious logins), you can publish them like so:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-middleware"
Middleware classes will be published to:
app/Http/Middleware/AuthLog/
The middleware documentation below lists all the available middlewares and how you can use them
Usage Guide
This package integrates deeply into your Laravel app with traits, scopes, components, and helpers. Hereβs how to get started and make the most of it.
𧬠Add the Trait to Your User Model
To enable logging, session tracking, and notifications, you must add the HasAuthLogs
trait to your User
model (or any model implementing Authenticatable
and Notifiable
):
use Xultech\AuthLogNotification\Traits\HasAuthLogs; class User extends Authenticatable { use HasAuthLogs; // ... }
This trait wires in all the core features of the package, including:
- Access to login and session history
- Device and location details for each login
- Notification routing (e.g. phone for SMS)
- Query scopes for fetching login activity
- Helpers for previous and current sessions
π§ Helper Methods from the Trait
After adding the trait, your model now has several powerful methods:
β±οΈ Login Timestamps
$user->lastLoginAt(); // Timestamp of latest login $user->previousLoginAt(); // Timestamp of login before last
π IP Address History
$user->lastLoginIp(); // IP of last login $user->previousLoginIp(); // IP before last
π Login History & Collections
$user->authentications(); // All login logs (latest first) $user->logins(); // Last 5 successful logins $user->logins(10); // Last 10 logins $user->loginsToday(); // Logins from today only
β Failed & Suspicious Logins
$user->failedLogins(); // All failed attempts $user->failedLoginsCount(); // Count of failed attempts $user->suspiciousLogins(); // New device or location $user->lastLoginWasSuspicious(); // Was last login suspicious? $user->lastLoginWasFromIp('1.2.3.4'); // Did user login from a specific IP?
π Location & Device Awareness
$user->lastKnownLocation(); // e.g., "Lagos, Nigeria" $user->lastKnownDevice(); // e.g., "Windows / Chrome (Desktop)"
π₯ Sessions & Activity
$user->activeSessions(); // Logins not yet logged out $user->hasMultipleSessions(); // More than one active session?
π Query Scopes (AuthLogUserScopes)
This package also registers custom query scopes dynamically via AuthLogUserScopes::register(): Example Queries:
User::loggedInToday()->get(); // Users active today User::withFailedLogins()->get(); // Users with failed attempts User::suspiciousActivity()->get(); // Users with flagged logins User::multipleSessions()->get(); // Users with concurrent sessions User::inactiveSince(60)->get(); // Users inactive for 60+ days
Ensure AuthLogUserScopes::register() is called in a service provider (usually the package does this automatically).
π The AuthLog Model
All authentication events are stored in the auth_logs table via the AuthLog model.
Relationships:
$log->authenticatable; // Returns the related User/Admin/etc.
Scopes
AuthLog::completed(); // Sessions with logout_at AuthLog::active(); // Currently active sessions AuthLog::failed(); // Failed login attempts AuthLog::fromIp('1.2.3.4'); // Filter by IP AuthLog::withSession($id); // Filter by session_id
State Checkers:
$log->isActive(); // Session still active? $log->isFailed(); // Was this a failed login? $log->isSuspicious(); // Marked suspicious? $log->isLogin(); // Is this a login event? $log->isLogout(); // Is this a logout event?
Accessors
$log->formatted_location; // "Lagos, Nigeria" $log->device_summary; // "MacOS / Safari (Mobile)" $log->event_type; // "Login", "Failed Login" $log->login_at_formatted; // "2025-03-23 18:00:00" $log->referrer_domain; // Extracts domain from referrer $log->user_agent_fragment; // First 80 chars of user-agent $log->is_suspicious; // Boolean (true if login is suspicious)
is_suspicious
is a computed property that uses theSuspicionDetector
service and respects the config settings for new device or new location detection.
π Notifications
This package allows you to notify users of login activity using Laravelβs built-in notification channels.
Notifications are sent when a user logs in, and can be routed through:
- Email (Mail)
- Slack (via webhook)
- SMS (via Nexmo/Vonage)
You have full control over:
- Which channels to use
- What content is sent
- When the notification is triggered (e.g., always or only on suspicious activity)
- Whether to use Laravel's
Notification
system or a customMailable
Manually Logging Authentication Events
In addition to automatic detection through Laravel's auth events, you can also manually trigger logs and alerts from within your controllers, services, or custom login flows. This gives you full control over when and how logging occurs β especially useful for custom guards or stateless APIs.
π Login
use Illuminate\Auth\Events\Login; use Illuminate\Support\Facades\Event; use Illuminate\Http\Request; // Inside your login controller or service $user = User::where('email', $request->email)->first(); // Perform login logic... // Manually dispatch login event Event::dispatch(new Login('web', $user, false));
β Failed Login
use Illuminate\Auth\Events\Failed; Event::dispatch(new Failed('web', null, [ 'email' => $request->email, 'password' => $request->password, ]));
π Logout
use Illuminate\Auth\Events\Logout; Event::dispatch(new Logout('web', auth()->user()));
π Password Reset
use Illuminate\Auth\Events\PasswordReset; Event::dispatch(new PasswordReset($user));
π Re-Authentication (e.g. Password Confirm Screens)
If you implement a flow like password confirmation, you can dispatch:
use Xultech\AuthLogNotification\Events\ReAuthenticated; Event::dispatch(new ReAuthenticated($user));
You only need to do this in custom logic. Laravel will automatically fire these events when using its built-in authentication system.
π§ Notification Configuration
In your config/authlog.php
, youβll find the full notification settings:
'notification' => [ 'channels' => ['mail'], // Options: 'mail', 'slack', 'nexmo' 'mode' => 'notification', // or 'mailable' 'only_on_suspicious_activity' => true, // Only notify when flagged ], 'default_notification' => [ 'subject' => 'New Login Detected', 'slack_channel' => '#security-alerts', 'mail_from' => env('MAIL_FROM_ADDRESS', 'no-reply@example.com'), 'mail_view' => 'authlog::mail.login-alert', // or 'authlog::mail.login-alert-html' 'view_type' => 'markdown', // or 'html' ],
π Notification Modes
1. notification (default)
This uses Laravel's standard Notification class, meaning it's queued, well-integrated, and flexible.
'view_type' => 'markdown',
2. mailable
If you prefer a full Mailable class (like a styled HTML email with branding), set this mode.
'view_type' => 'html',
Both modes are supported, and you can publish and override the default templates.
If you are using markdown, you must also publish the Laravelβs Default Mail Views
Run this command to publish the views:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-views" php artisan vendor:publish --tag=laravel-mail
if you encounter any errors while using
html
, run this:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-views"
This publishes the custom HTML mail view for the email. Also ensure you set
'mail_view' => 'authlog::mail.login-alert', // or 'authlog::mail.login-alert-html'
to the corresponding view. You can define your default view which will be used, only that you need to
set it in the mail_view
configuration option.
π‘ Notification Channels
Define the channels you want to use:
'channels' => ['mail', 'slack', 'nexmo']
Each channel is configurable individually under channels_config:
'channels_config' => [ 'mail' => [ 'enabled' => true, 'template' => 'authlog::mail.login-alert', ], 'slack' => [ 'enabled' => true, 'channel' => '#security-alerts', ], 'nexmo' => [ 'enabled' => true, 'phone_field' => 'phone', ], ],
You can enable or disable each channel independently.
πΌοΈ Customizing Mail Templates
To customize the content or layout of your login alert emails:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-views"
This will publish views like:
resources/views/vendor/authlog/mail/login-alert.blade.php
Update the layout, wording, or include branding as needed.
π§ Notification Routing (Slack & SMS)
Laravel needs to know where to send Slack messages or SMS alerts. You can define this in your User model.
Slack Routing
public function routeNotificationForSlack() { return 'https://hooks.slack.com/services/XXX/YYY/ZZZ'; }
Or dynamically from the user:
public function routeNotificationForSlack() { return $this->slack_webhook_url; }
Nexmo/Vonage SMS Routing
By default, the system will look for the field defined in phone_field:
'nexmo' => [ 'phone_field' => 'phone', ]
If your model uses a different field name or you want more control:
public function routeNotificationForNexmo() { return $this->phone_number; }
βοΈ Default Notification Settings
You can also globally define subject lines, fallback Slack channels, and sender emails:
'default_notification' => [ 'subject' => 'New Login Detected', 'slack_channel' => '#security-alerts', 'mail_from' => env('MAIL_FROM_ADDRESS', 'no-reply@example.com'), 'mail_view' => 'authlog::mail.login-alert', 'view_type' => 'markdown', // or 'html' ],
These settings are used when no user-specific overrides exist.
π Suspicious Login Notifications Only
If you want to notify users only when a login is suspicious, enable this:
'only_on_suspicious_activity' => true,
Suspicious logins are flagged when:
- The user logs in from a new device
- The user logs in from a new location
This helps reduce noise and only notifies users when their account might be at risk.
This notification system is fully extensible, so you can create your own custom notifications, modify the channels, or build your own logic based on the AuthLog model or Laravel events.
𧩠Custom Hooks
This package allows you to hook into authentication events like login, logout, and failed login β giving you the power to run custom logic when those events fire.
You can define callbacks, dispatch jobs, send alerts, trigger audits, or anything else you want when a user authenticates.
π§ Configuration
In your config/authlog.php
, you'll find the hooks
section:
'hooks' => [ 'on_login' => null, 'on_logout' => null, 'on_failed' => null, ],
Each hook accepts one of the following:
- A class name that implements __invoke($user, $log)
- A closure
- A job class name
- A listener class
π Example: Logging Admin Login
Letβs say you want to log a message whenever an admin logs in:
use Illuminate\Support\Facades\Log; 'hooks' => [ 'on_login' => function ($user, $log, $request) { if ($user->is_admin) { Log::info("Admin {$user->name} logged in from {$log->ip_address}"); } }, ],
π Example: Dispatch a Job
'hooks' => [ 'on_failed' => \App\Jobs\HandleFailedLogin::class, ],
Your job should implement the __invoke() method or a handle() method that receives the $user, $log, and optionally $request.
class HandleFailedLogin implements ShouldQueue { public function handle($user, $log, $request) { // Block IP, alert security, log audit, etc. } }
π Hook Parameters
Each hook receives an array of three values, passed in the following order:
Parameter | Type | Description |
---|---|---|
$user |
Illuminate\Contracts\Auth\Authenticatable |
The user who triggered the event |
$log |
Xultech\AuthLogNotification\Models\AuthLog |
The AuthLog instance that was just saved |
$request |
Illuminate\Http\Request |
The Laravel Request object (IP, agent, etc.) |
If youβre using a closure or a class, make sure it accepts these arguments in the correct order:
function ($user, $log, $request) { // your logic here }
π¦ How Laravel Resolves Your Hook
When you pass a class name to a hook (like a job or listener), the package will resolve it using Laravelβs service container:
App::make(YourHookClass::class)->__invoke($user, $log, $request);
This means:
- β Laravel will automatically instantiate the class
- β Any constructor dependencies (e.g., services, config, logger) will be injected
- β
You donβt have to call
new ClassName(...)
manually
For example, this works perfectly:
class NotifySecurityTeam { public function __construct(LoggerInterface $logger) { $this->logger = $logger; } public function __invoke($user, $log, $request) { $this->logger->info("User {$user->email} logged in from suspicious IP."); } }
β Supported Hook Events
Hook Key | Triggered When |
---|---|
on_login |
After a successful login |
on_logout |
When a user logs out |
on_failed |
After a failed login attempt |
π¨ Suspicious Login Detection
This package includes built-in support for detecting suspicious login activity. It helps identify unusual behavior and protects user accounts by flagging logins from unfamiliar devices or locations.
π§ What Counts as Suspicious?
By default, a login is considered suspicious if it matches either of the following:
- The login comes from a new device (based on user agent/device metadata)
- The login comes from a new location (based on IP address or geolocation)
These rules are configurable in config/authlog.php
:
'suspicion_rules' => [ 'new_device' => true, 'new_location' => true, 'block_suspicious_logins' => false, ],
βοΈ How It Works
When a user logs in:
- The system compares the current device and location against previously seen records for the user.
- If either is different and enabled in the config, the login is marked as suspicious.
- The
AuthLog
record is saved with:
'is_new_device' => true, 'is_new_location' => true,
- You can act on this using:
- Notifications
- Custom hooks
- Blocking logic
- Admin alerts
π© Notify on Suspicious Activity Only
To notify users only when a login is suspicious, update this in authlog.php:
'notification' => [ 'only_on_suspicious_activity' => true, ]
If set to false
, users will be notified on every login, not just suspicious ones.
π Block Suspicious Logins (Optional)
You can take it a step further and prevent suspicious logins entirely by enabling:
'block_suspicious_logins' => true,
When this is enabled and a suspicious login is detected, the login process can be aborted based on your custom handler.
𧩠Custom Handler
If you're using custom logic to handle suspicious logins (e.g., verification steps or two-factor prompts), you can specify your own handler class:
'suspicious_login_handler' => \App\Handlers\MySuspiciousLoginHandler::class,
Your handler class should implement a handle(Request $request): Response
method. You can use this to:
Your custom handler should return a
Symfony\Component\HttpFoundation\Response
.
- Return a custom response (JSON, HTML, redirect)
- Trigger extra verification steps
- Log or report the attempt
- Notify administrators
- Abort the login process with a custom message
βοΈ Default Behavior
If you donβt provide a custom handler, the package uses a default handler:
\Xultech\AuthLogNotification\Handlers\SuspiciousLoginHandler::class
It returns a 403 JSON response:
{
"message": "Login blocked due to suspicious activity."
}
Suspicious login detection and blocking is a powerful, zero-config enhancement to your authentication system. Combined with notifications, hooks, and session tracking, it gives your app a strong layer of security intelligence.
π Event Listeners
This package automatically listens to key authentication-related events and logs them as AuthLog
entries.
Each event captures device metadata, location, IP, user agent, timestamp, and more. You can also hook into each event to run your own custom logic.
ποΈ Supported Events & Their Listeners
Event | Listener Class | Description |
---|---|---|
Login |
LoginEventListener |
Logs successful login, detects suspicious login, sends notification, and triggers hook |
Logout |
LogoutEventListener |
Updates the logout timestamp on the last login session |
Failed |
FailedLoginEventListener |
Logs failed login attempt and triggers rate limiter |
PasswordReset |
PasswordResetEventListener |
Logs password reset activity and triggers hook |
ReAuthenticated (custom) |
ReAuthenticatedEventListener |
Logs re-authentication (e.g., password confirm) |
β What Gets Logged
Each event logs the following data into the auth_logs
table:
- IP address
- City, country, and location (via GeoIP)
- Device, browser, platform
- Whether it's a mobile device
- Referrer URL
- User agent
- Event type (login, logout, failed, etc.)
- Timestamp (
login_at
orlogout_at
) - Session ID (if enabled)
𧩠Hook Support for Each Event
You can define custom logic for each of these in your config:
'hooks' => [ 'on_login' => ..., 'on_logout' => ..., 'on_failed' => ..., 'on_password_reset' => ..., 'on_re_authenticated' => ..., ],
π« Rate Limiting & Lockouts
This package provides a built-in mechanism to track failed login attempts and lock out users after too many failures.
It helps protect your application against brute-force attacks and abusive login behavior, using a customizable and developer-friendly configuration.
π§ Configuration
In your config/authlog.php
, the lockout settings are found under the lockout
key:
'lockout' => [ 'enabled' => true, 'key_prefix' => 'authlog:lockout:', 'max_attempts' => 5, 'lockout_minutes' => 10, 'track_by' => 'ip', // Options: 'ip', 'email', 'both' 'generic_response' => true, 'redirect_to' => '/login', ],
π οΈ How It Works
When a failed login event occurs, the system:
- Tracks the failure using a unique key (based on IP, email, or both).
- Increments a counter for that identifier.
- If the number of failed attempts
exceeds max_attempts
, the user is locked out for the duration oflockout_minutes
. - On subsequent login attempts, the login is blocked before authentication occurs.
π Using the Middleware
To enforce rate limiting before authentication, use the built-in middleware:
Route::post('/login', [LoginController::class, 'store']) ->middleware('authlog.enforce-lockout');
This checks the current identifierβs failure count before the login attempt is processed and blocks it if the lockout limit has been exceeded.
π¬ Customizing the Response
If generic_response
is true, the user will receive a plain message:
Too many login attempts. Please try again later.
If false, the system will redirect to the redirect_to
URL (usually /login) to show your UI or error message.
𧱠Middleware Overview
AuthLogNotification ships with several powerful middleware that can be used to secure your authentication flow, detect suspicious behavior, and block malicious requests before they reach your controllers.
These middleware are fully optional, but when enabled, they offer pre-authentication defense layers that can block bad actors early.
β Available Middleware
Middleware | Alias | Purpose |
---|---|---|
EnforceLoginRateLimit |
authlog.enforce-lockout |
Blocks users with too many failed login attempts |
BlockSuspiciousLoginAttempt |
authlog.block-suspicious |
Prevents login from new devices or locations (before authentication) |
VerifySessionFingerprint |
authlog.verify-session |
Detects session hijacking and mismatched device fingerprints |
These middleware are registered and ready to use once you publish them and attach them to your routes.
π¦ Publishing Middleware
To copy the middleware classes into your Laravel app (e.g., app/Http/Middleware/AuthLog/)
:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-middleware"
After publishing, you can customize them as needed.
π Registering the Middleware Alias
πΉ For Laravel 10 and Below (Using Kernel.php)
If you want to add aliases manually in your App\Http\Kernel
:
protected $routeMiddleware = [ // ... 'authlog.enforce-lockout' => \App\Http\Middleware\AuthLog\EnforceLoginRateLimit::class, 'authlog.block-suspicious' => \App\Http\Middleware\AuthLog\BlockSuspiciousLoginAttempt::class, 'authlog.verify-session' => \App\Http\Middleware\AuthLog\VerifySessionFingerprint::class, ];
The package automatically registers the aliases if your app supports it (Laravel 7+), but manual registration is also fine.
πΉ For Laravel 11+ and 12
In Laravel 11 and 12, middlewares are no longer registered in Kernel.php
. Instead, you can use them directly in your routes or register them globally in bootstrap/app.php
.
π·οΈ Option 1: Apply Middleware Directly in Routes
Since Laravel 11+ supports middleware discovery, you can use fully qualified class names directly in your routes:
use Xultech\AuthLogNotification\Http\Middleware\EnforceLoginRateLimit; use Xultech\AuthLogNotification\Http\Middleware\BlockSuspiciousLoginAttempt; Route::post('/login', LoginController::class) ->middleware([ EnforceLoginRateLimit::class, BlockSuspiciousLoginAttempt::class, ]);
π·οΈ Option 2: Register Middleware in bootstrap/app.php
If you want to use named aliases (like authlog.block-suspicious
), manually register middleware in bootstrap/app.php
:
->withMiddleware(function (Middleware $middleware) { $middleware->alias([ 'authlog.enforce-lockout' => \Xultech\AuthLogNotification\Http\Middleware\EnforceLoginRateLimit::class, 'authlog.block-suspicious' => \Xultech\AuthLogNotification\Http\Middleware\BlockSuspiciousLoginAttempt::class, 'authlog.verify-session' => \Xultech\AuthLogNotification\Http\Middleware\VerifySessionFingerprint::class, ]); })
Now you can use the alias in routes:
Route::post('/login', [LoginController::class, 'store']) ->middleware(['authlog.block-suspicious']);
ποΈ Publishing Middleware (Optional)
If you want to customize the middleware, you can publish them into your Laravel application:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-middleware"
π§ͺ Blade Components
This package includes a set of pre-built Blade components to display useful login and session-related data on your frontend β like dashboards, profile pages, or admin panels.
These components help you quickly show login insights without writing extra code.
πΉ Available Components
You must add the
HasAuthLogs
trait to your model for these components to work.
Component | Usage | Description |
---|---|---|
<x-authlog:last-login /> |
@component('authlog::last-login') |
Shows the user's last login time and location |
<x-authlog:recent-logins /> |
@component('authlog::recent-logins') |
Shows the last 5 login entries (with flags) |
<x-authlog:suspicious-alert /> |
@component('authlog::suspicious-alert') |
Warning if last login was suspicious |
<x-authlog:session-count /> |
@component('authlog::session-count') |
Number of active sessions for the current user |
π How to Publish Blade Components
If you want to customize how these components look or behave, publish them to your app:
php artisan vendor:publish --provider="Xultech\AuthLogNotification\AuthLogNotificationServiceProvider" --tag="authlog-components"
This will copy them to:
resources/views/vendor/authlog/components/
You can now edit the components like regular Blade templates.
π§Ό Cleanup & Maintenance
Over time, your auth_logs
table can grow significantly. To help you manage storage and improve performance, this package includes Artisan commands for log cleanup and geo-location updates.
π§Ή Clean Old Auth Logs
Remove logs older than the retention period (defined in config/authlog.php
):
php artisan authlog:clean
This command uses either soft or hard delete based on the
retention.delete_method
config.
β Scheduling (Laravel 10 and below)
If you're using Laravel 10 or earlier, schedule this in app/Console/Kernel.php
:
$schedule->command('authlog:clean')->daily();
β Scheduling (Laravel 11+)
Use the new routes/console.php
format:
use Illuminate\Support\Facades\Schedule; Schedule::command('authlog:clean')->daily();
𧽠Prune Suspicious Logs
If you're storing a lot of logs marked as suspicious (e.g., is_new_device or is_new_location
), and you no longer need them, run:
Laravel 10 and below:
$schedule->command('authlog:prune-suspicious')->weekly();
Laravel 11 and 12:
use Illuminate\Support\Facades\Schedule; Schedule::command('authlog:prune-suspicious')->weekly();
π Sync Geo-Location
If your IP geolocation source has changed or some entries have missing location data, you can reprocess them using:
php artisan authlog:sync-location
This will update all logs missing country, city, or location fields using your configured location service.
π§ͺ Testing
This package includes built-in Pest tests to ensure its core components are working as expected. You can also write your own tests to validate behavior in your application.
β Requirements
To run tests locally, make sure you have:
- PHP 8.0+
- Composer
- Pest PHP installed globally or locally (installed via
dev
dependencies)
π¦ Running Tests
To run the full test suite:
./vendor/bin/pest
Or, if Pest is installed globally:
pest
π€ Contributing
Thank you for considering contributing to AuthLogNotification
! Your help is deeply appreciated.
Whether you're reporting a bug, suggesting a feature, or submitting a pull request β youβre making the package better for everyone.
π οΈ How to Contribute
- Fork the repository.
- Clone your fork:
git clone https://github.com/Xultech-LTD/laravel-auth-log-notification.git cd auth-log-notification
- Install dependencies and set up the test environment.
- Create a new branch:
git checkout -b feature/my-improvement
- Write your changes and cover them with tests.
- Run the test suite
- Commit with a clear message
git commit -m "feat: added XYZ support to login hook"
- Push and open a Pull Request.
β Coding Guidelines
- Follow PSR-12 standards.
- Use meaningful variable and method names.
- Write tests for any new feature or fix.
- Keep pull requests focused and descriptive.
- Avoid breaking backward compatibility unless discussed.
π¦ Testing Notes
This package uses Pest PHP and includes a fully bootstrapped container to simulate a Laravel-like environment.
You can write unit and feature tests without needing a full Laravel app.
If you're unsure how to begin or where to contribute, feel free to open an issue and start the conversation.
Let's build safer Laravel apps together.
π Security
If you discover a vulnerability within this package, please do not report it publicly.
Instead, please send an email to open-source@xultechng.com or open a private issue on the repository.
We take security seriously and will respond promptly.
Responsible Disclosure
We appreciate responsible security disclosures and will:
- Acknowledge your report.
- Investigate and fix valid issues quickly.
- Credit you (if desired) once resolved.
π£οΈ Roadmap
Here are some planned and proposed features for future versions of this package:
- Core login/logout/failed event tracking
- Device & IP intelligence (suspicious login detection)
- Multi-channel notifications (Mail, Slack, SMS)
- Custom hooks for login lifecycle
- Session fingerprinting & hijack detection
- Rate limiting and lockout middleware
- Artisan commands for cleanup and geo sync
- Blade components for recent activity
- Middleware for pre-auth blocking
- Configuration-driven and extendable
Planned:
- Web UI for browsing logs
- Graphs & dashboard widgets (Jetstream/Livewire support)
- Admin review panel for suspicious events
- Custom log channel support
- First-party support for Fortify and Breeze
- Official Nova & Filament integrations
- Better localization support (i18n)
- Optional hashed user agents for privacy-sensitive apps
- Fine-grained control over notification triggers
- Export logs to CSV / external tools
Want to see something else? Open an issue or submit a feature request!
π License
This package is open-sourced software licensed under the MIT license.
You are free to use, modify, and distribute it within the terms of the license. Contributions are welcome and encouraged.
π Changelog
All notable changes to this project will be documented in this section.
This project follows Semantic Versioning.
[v1.0.0] - Initial Release
- β Login, logout, and failed login tracking
- π Suspicious login detection (new device or location)
- π£ Real-time notifications (Mail, Slack, SMS)
- 𧬠Session fingerprinting & hijack detection
- π« Rate limiting with lockout support
- 𧩠Blade components for login/session insights
- π οΈ Hooks & custom handlers
- ποΈ Artisan commands for cleanup and geolocation sync
- 𧱠Fully documented and testable outside Laravel app
π₯ Credits & Authors
AuthLogNotification was crafted with care by Michael Erastus under XulTech as part of our mission to build secure and developer-friendly Laravel tools.
Core Maintainer
- Michael Erastus β GitHub
Contributors
Special thanks to everyone who provided feedback, reported issues, or helped shape the direction of this package. Your support makes open source better.
If you find this package helpful, consider giving it a βοΈ on GitHub or sharing it with others in the Laravel community.
For contributions, ideas, or collaborations, feel free to reach out!
β οΈ Disclaimer
This package is provided as-is and is intended to enhance security awareness around authentication activity. While it offers advanced features such as suspicious login detection, session tracking, and brute-force protection, it does not guarantee absolute security.
You are responsible for ensuring that your Laravel application adheres to best practices, including:
- Keeping dependencies up to date
- Using secure authentication flows
- Regularly auditing and reviewing security configurations
- Complying with data protection regulations (e.g., GDPR)
By using this package, you acknowledge that:
- The authors and contributors are not liable for any security breaches, data loss, or misuse of the package.
- You should review and test all features before deploying them to production environments.
Use this package at your own discretion and always in conjunction with your existing security policies.