Security log analysis, reimagined

Devour your logs.
Surface threats.

Upload security logs, detect anomalies with explainable heuristics, match against live threat feeds, and get AI-powered analysis — all in one platform.

loggoblin analysis

$ loggoblin analyze proxy-logs.csv

Detected format: Zscaler Web Proxy CSV

Parsed 14,832 events in 2.1s

3 anomalies detected

! Burst: 10.0.1.47 — 340 requests in 60s

IOC Match: evil-payload.ru (URLhaus)

$ _

Built for security teams

14K+
Events parsed/sec
3
Threat feeds
5
Anomaly detectors
< 3s
Time to results

How it works

Three steps from raw logs to actionable intelligence.

01

Upload

Drag and drop your security log files. We auto-detect the format.

02

Analyze

Anomaly detectors and threat feeds process your logs in seconds.

03

Act

Review findings, read AI summaries, and respond to threats fast.

Everything you need to hunt threats

From raw logs to actionable intelligence in seconds.

Multi-Format Parsing

Auto-detect and parse JSONL, Zscaler Web Proxy CSV, and more. Stream-based processing handles massive log files.

Anomaly Detection

Heuristic-based detectors surface traffic bursts, rare domains, off-hours activity, and HTTP error spikes.

Threat Intelligence

Match events against live IOC feeds from Spamhaus, Feodo Tracker, and URLhaus. CIDR-aware IP matching.

AI Summaries

Optional Azure OpenAI integration generates SOC-friendly narrative reports with actionable recommendations.

Multi-Tenant Isolation

Every account gets isolated blob storage and strict resource scoping. Your data never touches another tenant.

Dashboard & Reporting

At-a-glance stats, upload history, anomaly timelines, and detailed event tables. Export-ready results.

See threats at a glance

A real-time dashboard built for security operations.

LogGoblin Dashboard
Total Events
14,832
+12%
Anomalies
3
Critical
IOC Matches
1
High
Parse Time
2.1s
Fast
Events by Hour
00:0006:0012:0018:0023:00

Simple pricing

Open source and free. Self-host it, own your data.

Free & Open Source
$0/ forever

Everything included. No usage limits. No credit card.

  • Unlimited log uploads
  • All 5 anomaly detectors
  • Spamhaus, Feodo & URLhaus feeds
  • Multi-tenant isolation
  • Dashboard & reporting
  • AI summaries (bring your own key)
  • Self-hosted — your data stays yours
Get Started Free

Ready to gobble up some logs?

Create your free account and start analyzing security logs in minutes.

Start Free