📋

Log Analyzer

Paste server logs and detect suspicious patterns — SQL injection, XSS, brute force, scanners and more

Detection Rules

💉

SQL Injection

T1190

UNION SELECT, tautologies (OR 1=1), comment sequences, DROP/INSERT/EXEC keywords

🖥️

Cross-Site Scripting

T1059.007

<script> tags, JavaScript event handlers (onerror, onload), javascript: URI schemes

📁

Path Traversal / LFI

T1083

../ sequences, /etc/passwd, /proc/self/environ, Windows config files

Remote Code Execution

T1059

Shell operator injection (;, |, backtick), remote payload download via wget/curl

🔐

Brute Force

T1110

5+ HTTP 401 failures from the same IP address — credential stuffing or password spraying

🔍

Security Scanners

T1595

Nikto, sqlmap, Nmap, Burp Suite, DirBuster/Gobuster user-agent fingerprints

🗂️

Sensitive File Access

T1083

.env files, .git repos, backup/SQL dumps, WordPress admin paths

🤖

Automated Requests

python-requests, curl user-agents — scripted or automated access patterns