---
title: GitHub activity observed from Tor client IP
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: >-
  Docs > Datadog Security > OOTB Rules > GitHub activity observed from Tor
  client IP
---

# GitHub activity observed from Tor client IP
Classification:attackTactic:[TA0001-initial-access](https://attack.mitre.org/tactics/TA0001)Technique:[T1090-proxy](https://attack.mitre.org/techniques/T1090) 
## Goal{% #goal %}

Detect when GitHub activity is observed from a Tor exit node.

## Strategy{% #strategy %}

This rule monitors GitHub telemetry logs to determine when activity originated from a Tor client. Datadog enriches all ingested logs with [expert-curated threat intelligence](https://docs.datadoghq.com/security/cloud_siem/ingest_and_enrich/threat_intelligence.md) in real-time. An attacker may use a Tor client to anonymize their true origin when accessing GitHub programmatically.

## Triage and response{% #triage-and-response %}

- Determine whether `{{@github.actor}}` from IP address `{{@network.client.ip}}` has a legitimate reason to access GitHub via Tor.
- Review the specific actions performed during the session for indicators of reconnaissance, credential misuse, or data access.
- Check whether this activity coincides with other suspicious signals from the same identity such as secret enumeration or branch protection changes.
