Web Server Log Analyzer

Analyze access logs and surface suspicious requests locally in your browser.

All analysis happens locally in your browser. No data is uploaded to our servers.

Drop an access log file to quickly extract requests, status codes and detect potentially malicious payloads. Use the built-in CSV export to save findings for offline review.

How it works

The tool parses common access log formats (Combined/Common) client-side, extracts fields (IP, method, URI, status) and applies regex-based heuristics to flag likely SQLi, XSS and path traversal attempts. Large files are processed in a Web Worker to keep the UI responsive.

Note: this is a triage aid. Findings are heuristic and should be validated with additional investigation.

Input

Drop a file here or click to browse

Accepted: .log,.txt,.gz,.zip

No file selected

Drop a web server log to start analysis.

Frequently Asked Questions

Which log formats are supported?

Common and Combined log formats (Apache/Nginx) are supported; arbitrary text logs are also parsed heuristically.

Is my log data uploaded?

No. All parsing and analysis runs locally in your browser; no files are transmitted.

How are suspicious requests detected?

The tool applies simple regex-based heuristics for SQLi, XSS and path traversal; it is a triage aid, not a definitive detector.