Cyber Detect

Advanced Security Log Analysis

Upload Log File or Try Demo

Demo Dataset

Synthetic Apache Server Logs

Test the application with pre-generated Apache server logs containing various security threats and attack patterns. Perfect for exploring all detection capabilities without needing your own log files.

ZIP Format Ready to Use
Or upload your own file

Upload Log File

Drag and drop your log file here, or click to select

Supported formats: .log, .txt, .zip, .gz • Max size: 100MB

{{ selectedFile.name }} ({{ formatFileSize(selectedFile.size) }})

Security Threat Analysis

Analyze log files for security threats and attack patterns

Please upload a log file or load the demo dataset to perform security analysis.

Log file loaded successfully. {{ logData.length }} entries ready for analysis.

{{ attack.name }}

{{ attack.severity.toUpperCase() }}
{{ threatResults[attack.endpoint]?.length || 0 }}
instances

{{ attack.description }}

AI Custom Threat Scans

Create custom threat detectors using AI

{{ detector.name }}

{{ detector.severity.toUpperCase() }}

{{ detector.description }}

Created: {{ new Date(detector.createdAt).toLocaleDateString() }} {{ customThreatResults[detector.id].length }} threats found

No Custom Threat Detectors

Create AI-powered custom threat detectors to scan for specific security patterns

Security Data Table

View all detected security threats in a comprehensive table format

No Data Available

Run security scans to see results in the data table.

Filters

{{ attackType }}
{{ method }}
{{ status }}
Showing {{ getPaginatedResults(getFilteredResults(getAllResults(), dataTableFilters), dataTableCurrentPage, dataTablePerPage).length }} of {{ getFilteredResults(getAllResults(), dataTableFilters).length }} results
Total threats: {{ getAllResults().length }}
IP Address Timestamp Method Path Status Attack Type Reason
{{ result.ip }} {{ formatTimestamp(result.timestamp) }} {{ result.method }}
{{ result.path }}
{{ result.status }} {{ result.attack_type }}
{{ result.suspicion_reason }}
Page {{ dataTableCurrentPage }} of {{ getTotalPages(getFilteredResults(getAllResults(), dataTableFilters).length, dataTablePerPage) }}

Create Custom Threat Detector

Tips for better results:

  • Be specific about what patterns to look for
  • Mention relevant HTTP methods, status codes, or URL patterns
  • Include examples of suspicious behavior if possible
  • Specify if it should look in specific log fields (path, user-agent, etc.)

{{ currentFunctionName }} Detection Function

{{ currentFunctionCode }}

{{ currentResultsTitle }} - Detection Results

Filters

{{ method }}
{{ status }}
Showing {{ getPaginatedResults(getFilteredResults(currentResults, resultsFilters), resultsCurrentPage, resultsPerPage).length }} of {{ getFilteredResults(currentResults, resultsFilters).length }} results
Total detections: {{ currentResults.length }}
IP Address Timestamp Method Path Status User Agent Reason
{{ result.ip }} {{ formatTimestamp(result.timestamp) }} {{ result.method }} {{ result.path }} {{ result.status }} {{ result.user_agent }} {{ result.suspicion_reason }}
Page {{ resultsCurrentPage }} of {{ getTotalPages(getFilteredResults(currentResults, resultsFilters).length, resultsPerPage) }}

Settings

API Configuration

Configure your AI provider settings once. These will be used for report generation and future AI features.

Generate AI Security Report

{{ provider.name }}

{{ provider.description }}

Your API key is used only for this request and is not stored.

Report Summary

Total Threats: {{ getTotalThreats() }}

Attack Types: {{ getUniqueAttackTypes().length }}

Dataset: {{ selectedFile?.name || 'Demo Dataset' }}

AI Generated Security Report