Web Server Log Analyzer
Analyze access logs and surface suspicious requests locally in your browser.
Drop an access log file to quickly extract requests, status codes and detect potentially malicious payloads. Use the built-in CSV export to save findings for offline review.
How it works
The tool parses common access log formats (Combined/Common) client-side, extracts fields (IP, method, URI, status) and applies regex-based heuristics to flag likely SQLi, XSS and path traversal attempts. Large files are processed in a Web Worker to keep the UI responsive.
Note: this is a triage aid. Findings are heuristic and should be validated with additional investigation.
Input
Drop a file here or click to browse
Accepted: .log,.txt,.gz,.zip
No file selected
Drop a web server log to start analysis.
Frequently Asked Questions
Which log formats are supported?
Common and Combined log formats (Apache/Nginx) are supported; arbitrary text logs are also parsed heuristically.
Is my log data uploaded?
No. All parsing and analysis runs locally in your browser; no files are transmitted.
How are suspicious requests detected?
The tool applies simple regex-based heuristics for SQLi, XSS and path traversal; it is a triage aid, not a definitive detector.