Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 519

Impossible Travel Detection

What is Impossible Travel Detection?

Impossible Travel DetectionA detection that flags successive sign-ins from geographic locations too far apart to be reached by any plausible travel within the elapsed time.


Impossible travel detection compares the IP-geolocated source of two successful authentications for the same identity and computes the implied travel speed. If user U signs in from New York at 09:00 UTC and then from Singapore at 10:30 UTC, the implied speed is far above commercial aviation and the second event is treated as suspicious. Microsoft Entra ID, Okta ThreatInsight, Google Workspace, and most SIEMs ship a built-in 'atypical travel' or 'unusual location' analytic, typically combined with VPN and Tor-exit reputation lists to avoid false positives. The signal alone is rarely conclusive — modern playbooks use it to trigger step-up authentication or session revocation, often documented in MITRE ATT&CK technique T1078 (Valid Accounts).

Examples

  1. 01

    Entra ID risky sign-in raising 'atypical travel' when the same account logs in from Paris and Sao Paulo within 30 minutes.

  2. 02

    An Okta ThreatInsight policy revoking sessions when geo-velocity exceeds 800 km/h.

Frequently asked questions

What is Impossible Travel Detection?

A detection that flags successive sign-ins from geographic locations too far apart to be reached by any plausible travel within the elapsed time. It belongs to the Identity & Access category of cybersecurity.

What does Impossible Travel Detection mean?

A detection that flags successive sign-ins from geographic locations too far apart to be reached by any plausible travel within the elapsed time.

How does Impossible Travel Detection work?

Impossible travel detection compares the IP-geolocated source of two successful authentications for the same identity and computes the implied travel speed. If user U signs in from New York at 09:00 UTC and then from Singapore at 10:30 UTC, the implied speed is far above commercial aviation and the second event is treated as suspicious. Microsoft Entra ID, Okta ThreatInsight, Google Workspace, and most SIEMs ship a built-in 'atypical travel' or 'unusual location' analytic, typically combined with VPN and Tor-exit reputation lists to avoid false positives. The signal alone is rarely conclusive — modern playbooks use it to trigger step-up authentication or session revocation, often documented in MITRE ATT&CK technique T1078 (Valid Accounts).

How do you defend against Impossible Travel Detection?

Defences for Impossible Travel Detection typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Impossible Travel Detection?

Common alternative names include: Atypical travel, Geo-velocity anomaly, Superman travel.

Related terms