5. Logs
π Overview
The Logs section in ShieldsGuard provides real-time and historical visibility into all incoming traffic and security events across your protected applications.
With powerful filtering, search, and categorization capabilities, this section allows you to:
Monitor all request activity to your website
Investigate malicious behavior and blocked threats
Conduct forensics and incident response
Track behavioral patterns of users and attackers
π Log Categories
The log system is divided into two focused modules:
π 5.1 Access Log
Track every single request made to your site, including:
IP address
URL path
Request method (GET/POST/PUT/...)
Status code (200, 403, 404, 503, etc.)
User Agent
Timestamp
Ideal for:
Identifying traffic trends
Debugging routing or frontend issues
Auditing general request flow
See Access Log β
π‘οΈ 5.2 Security Log
Displays only filtered, blocked, or flagged activity, including:
Brute-force attacks
SQLi/XSS/JITP pattern detections
DDoS mitigations
WAF or custom rule triggers
IP-based blocks
Ideal for:
Analyzing blocked threats
Validating protection effectiveness
Conducting post-incident investigations
See Security Log β
π
Log Filtering Features
All logs are fully filterable by:
Date and time range
IP address
URL path
HTTP method
Attack type (for security log)
User-Agent
Status code
Logs can also be exported or reviewed in real time for immediate response and situational awareness.
βοΈ Use Cases
Investigate unusual traffic
See spikes in Access Log
Trace blocked attack
Review Security Log for attack type and payload
Identify brute-force bots
Filter for login URL + POST + 403
Correlate WAF actions
View Security Log + URL breakdown
Troubleshoot service issues
Filter Access Log by 503 or 5xx codes
π― ShieldsGuard Logs provide transparency, traceability, and visibility into every corner of your websiteβs traffic β empowering you to investigate, understand, and defend with confidence.
Last updated