5. Logs
📖 Overview
The Logs section in ShieldsGuard provides real-time and historical visibility into all incoming traffic and security events across your protected applications.
With powerful filtering, search, and categorization capabilities, this section allows you to:
Monitor all request activity to your website
Investigate malicious behavior and blocked threats
Conduct forensics and incident response
Track behavioral patterns of users and attackers
📊 Log Categories
The log system is divided into two focused modules:
🔍 5.1 Access Log
Track every single request made to your site, including:
IP address
URL path
Request method (GET/POST/PUT/...)
Status code (200, 403, 404, 503, etc.)
User Agent
Timestamp
Ideal for:
Identifying traffic trends
Debugging routing or frontend issues
Auditing general request flow
See Access Log →
🛡️ 5.2 Security Log
Displays only filtered, blocked, or flagged activity, including:
Brute-force attacks
SQLi/XSS/JITP pattern detections
DDoS mitigations
WAF or custom rule triggers
IP-based blocks
Ideal for:
Analyzing blocked threats
Validating protection effectiveness
Conducting post-incident investigations
See Security Log →
📅 Log Filtering Features
All logs are fully filterable by:
Date and time range
IP address
URL path
HTTP method
Attack type (for security log)
User-Agent
Status code
Logs can also be exported or reviewed in real time for immediate response and situational awareness.
⚙️ Use Cases
Investigate unusual traffic
See spikes in Access Log
Trace blocked attack
Review Security Log for attack type and payload
Identify brute-force bots
Filter for login URL + POST + 403
Correlate WAF actions
View Security Log + URL breakdown
Troubleshoot service issues
Filter Access Log by 503 or 5xx codes
5.1 Access Log5.2 Security Log🎯 ShieldsGuard Logs provide transparency, traceability, and visibility into every corner of your website’s traffic — empowering you to investigate, understand, and defend with confidence.
Last updated

