Upload security logs, detect anomalies with explainable heuristics, match against live threat feeds, and get AI-powered analysis — all in one platform.
$ loggoblin analyze proxy-logs.csv
✓ Detected format: Zscaler Web Proxy CSV
✓ Parsed 14,832 events in 2.1s
✓ 3 anomalies detected
! Burst: 10.0.1.47 — 340 requests in 60s
✕ IOC Match: evil-payload.ru (URLhaus)
$ _
Built for security teams
Three steps from raw logs to actionable intelligence.
Drag and drop your security log files. We auto-detect the format.
Anomaly detectors and threat feeds process your logs in seconds.
Review findings, read AI summaries, and respond to threats fast.
From raw logs to actionable intelligence in seconds.
Auto-detect and parse JSONL, Zscaler Web Proxy CSV, and more. Stream-based processing handles massive log files.
Heuristic-based detectors surface traffic bursts, rare domains, off-hours activity, and HTTP error spikes.
Match events against live IOC feeds from Spamhaus, Feodo Tracker, and URLhaus. CIDR-aware IP matching.
Optional Azure OpenAI integration generates SOC-friendly narrative reports with actionable recommendations.
Every account gets isolated blob storage and strict resource scoping. Your data never touches another tenant.
At-a-glance stats, upload history, anomaly timelines, and detailed event tables. Export-ready results.
A real-time dashboard built for security operations.
Open source and free. Self-host it, own your data.
Everything included. No usage limits. No credit card.
Create your free account and start analyzing security logs in minutes.
Start Free