5. Logs

📖 Overview

The Logs section in ShieldsGuard provides real-time and historical visibility into all incoming traffic and security events across your protected applications.

With powerful filtering, search, and categorization capabilities, this section allows you to:

  • Monitor all request activity to your website

  • Investigate malicious behavior and blocked threats

  • Conduct forensics and incident response

  • Track behavioral patterns of users and attackers


📊 Log Categories

The log system is divided into two focused modules:


🔍 5.1 Access Log

Track every single request made to your site, including:

  • IP address

  • URL path

  • Request method (GET/POST/PUT/...)

  • Status code (200, 403, 404, 503, etc.)

  • User Agent

  • Timestamp

Ideal for:

  • Identifying traffic trends

  • Debugging routing or frontend issues

  • Auditing general request flow

See Access Log →


🛡️ 5.2 Security Log

Displays only filtered, blocked, or flagged activity, including:

  • Brute-force attacks

  • SQLi/XSS/JITP pattern detections

  • DDoS mitigations

  • WAF or custom rule triggers

  • IP-based blocks

Ideal for:

  • Analyzing blocked threats

  • Validating protection effectiveness

  • Conducting post-incident investigations

See Security Log →


📅 Log Filtering Features

All logs are fully filterable by:

  • Date and time range

  • IP address

  • URL path

  • HTTP method

  • Attack type (for security log)

  • User-Agent

  • Status code

Logs can also be exported or reviewed in real time for immediate response and situational awareness.


⚙️ Use Cases

Objective
Use the Logs to...

Investigate unusual traffic

See spikes in Access Log

Trace blocked attack

Review Security Log for attack type and payload

Identify brute-force bots

Filter for login URL + POST + 403

Correlate WAF actions

View Security Log + URL breakdown

Troubleshoot service issues

Filter Access Log by 503 or 5xx codes


🎯 ShieldsGuard Logs provide transparency, traceability, and visibility into every corner of your website’s traffic — empowering you to investigate, understand, and defend with confidence.

5.1 Access Logchevron-right5.2 Security Logchevron-right

Last updated