Key detection indicators for credential stuffing:
- High volume of failed logins from distributed IPs
- Login attempts using email addresses not in your user database
- Unusual geographic distribution of login attempts
- Automated patterns (consistent timing, user-agent strings)
For mitigation, implement rate limiting, CAPTCHA after failed attempts, and consider a WAF with bot detection capabilities.