All Documentation
Activity & Security Log
VitalHops maintains a detailed activity log of all account events, helping you monitor your account security and track changes.
Activity Timeline
Your activity log records key events including:
- Login/Logout — Every sign-in and sign-out event
- Password Changes — Password updates and resets
- Email Verification — Email confirmation events
- 2FA Events — Enabling, disabling, and using two-factor authentication
- Profile Updates — Changes to your personal information
- KYC Submissions — Document upload and verification events
- Device Changes — New device logins and trust status changes
- Account Events — Account lock/unlock and other administrative events
Viewing Your Activity
- Navigate to the Activity section from your dashboard
- View events in chronological order
- Each entry shows:
- Event type and description
- Date and time
- IP address and approximate location
- Device and browser information
- Severity level
Severity Levels
Events are classified by severity to help you identify important activities:
| Level | Examples |
|---|---|
| Low | Regular logins, profile views |
| Medium | Password changes, profile updates |
| High | New device logins, 2FA changes, failed login attempts |
| Critical | Account lockouts, backup code usage, suspicious activity |
Security Alerts
VitalHops actively monitors for suspicious activity:
New Device Detection
When someone logs into your account from a new device:
- You receive an email notification
- The event is logged with IP address and geolocation data
- Device details (browser, OS, device type) are recorded
Suspicious Login Alerts
Alerts are triggered for:
- Logins from unusual locations
- Multiple failed login attempts
- Access from previously unseen IP addresses
2FA Backup Code Usage
If a backup code is used instead of the authenticator app, this is flagged as a high-severity event since it may indicate the user lost access to their primary 2FA device.
Device Manager
The Device Manager provides a detailed view of all devices that have accessed your account:
Device Details
- Device Type — Desktop, Mobile, or Tablet
- Browser — Chrome, Safari, Firefox, etc.
- Operating System — Windows, macOS, iOS, Android, etc.
- First Seen — When the device first accessed your account
- Last Active — Most recent activity from this device
- IP Address — Last known IP and location (country, city)
Device Actions
- Trust/Untrust — Mark devices as trusted or untrusted
- Remote Logout — Force sign-out from a specific device
- Review History — See all activity from a particular device
Best Practices
- Review your activity log weekly for any unfamiliar events
- Pay attention to high and critical severity events
- If you see unrecognized devices, immediately change your password and enable 2FA
- Keep your security contact details (email, phone) up to date for timely alerts
- Use the Device Manager to remove old devices you no longer use