Hey
Depending on your environment, theres a number of factors that will help you in regards to viewing, detecting and working on Suspicious login attempts.
First is your Sentinel ingesting Identity protection logs and/or Microsoft Defender for Identity logs etc, if so there will be a new table that is generated within Microsoft sentinel for suspicious login attempts across your Microsoft based infrastructure. If you are wanting to monitor from bespoke sources then ingesting data in from these sources and identifying unusual activity i.e brute force etc. Custom alerting will need to be created for these types depending if they are Microsoft supported or not
Hope this helps, if you need more information, please reach out
Regards
Bill