Showing 28 open source projects for "logs"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    CrowdSec

    CrowdSec

    Firewall able to analyze visitor behavior & provide adapted response

    ...IP Blocklists are limited to very-safe-to-ban IPs only (~5% of the global database so far, will grow soon). A modern behavior detection system, written in Go. It stacks on Fail2ban's philosophy, but uses Grok patterns & YAML grammar to analyse logs, a modern decoupled approach (detect here, remedy there) for Cloud/Containers/VM based infrastructures. Once detected you can remedy threats with various bouncers (block, 403, Captchas, etc.) and blocked IPs are shared among all users to further improve their security. Crowdsec is an open-source, lightweight software, detecting peers with aggressive behaviors.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    SSHGuard

    SSHGuard

    Intelligently block brute-force attacks by aggregating system logs

    SSHGuard protects hosts from brute-force attacks against SSH and other services. It aggregates system logs and blocks repeat offenders using several firewall backends, including iptables, ipfw, and pf.
    Leader badge
    Downloads: 148 This Week
    Last Update:
    See Project
  • 3

    Web-based Firewall Log Analyzer

    Firewall log analyzer

    Flexible web-based firewall log analyzer, supporting netfilter and ipfilter, ipfw, ipchains, cisco routers and Windows XP system logs, and mysql or postgresql database logs using the iptables ULOG or NFLOG target of netfilter others mapped to the ulogd format with a view. Fully supports IPv6 for database logs, and netfilter and ipfilter system file logs. Also supports Maxmind's GeoIP version 2 location databases. For Linux, FreeBSD, OpenBSD, Solaris, OSX,etc.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Verigio - Geo Firewall

    Verigio - Geo Firewall

    Blocking and monitoring of network traffic based on geography.

    Geo Firewall performs blocking of network traffic based on geography (geo IP), allows to add custom subnets, allows exceptions on ports for incoming traffic for specific geography, keeps visual and persistent logs, shows statistics, automatically updates geographical database.
    Downloads: 2 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 5
    360-FAAR  Firewall Analysis Audit Repair

    360-FAAR Firewall Analysis Audit Repair

    360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs

    360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file! Read Policy and Logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), Cisco ASA (show run / syslog format), 360-FAAR compares firewall policies and uses CIDR and text filters to split rulebases / policies into target sections and identify connectivity for further analysis. 360-FAAR supports, policy to log association, object translation, rulebase reordering and simplification, rule moves and duplicate matching automatically. ...
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Bifrozt

    Bifrozt

    High interaction honeypot solution for Linux based systems

    NOTICE: The format of this project has been changed from ISO to using ansible and has been moved to GitHub. Github link: https://github.com/Bifrozt/bifrozt-ansible
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    mikrotik-ips-ids

    mikrotik-ips-ids

    IDS + IPS for RouterOS (mikrotik)

    This project reads logs from your mikrotik firewall and creates an address list with detected attackers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Network Connection Test

    Server and Client applications for testing network connectivity.

    “Network Connection Test“ has two applications, one Server and one Client. The Server application listens on a TCP and/or UDP port and the Client application connects to these ports. Both applications display logs when the client connects and the data is being sent and received. This is a useful tool when configuring network routers or firewalls. The source code is a demonstration of sockets and multithreading programming using C#.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This Library provides a java API for firewall logs, connection tracking and rules management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 10

    Fail2Ban4Win

    Un Fail2Ban pour windows

    ATTENTION VERSION :proof of concept Outils qui examine les logs systeme de windows pour créer dynamiquement des règles de blocages (temporaire ou permanent) dans le firewall windows lors de tentatives raté de connexions (MSSQL pour le moment mais SSH et autre après).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Build FW1 Cisco Netscreen PolicyFromLogs
    These three tools build Checkpoint, Cisco ASA or Netscreen policys from logfiles. They write dbedit, access-list or set address, set service and set policy commands for the traffic seen in the logs, that can be cut and pasted into the firewalls. WOOT
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    PFL can either operate as a stand-alone firewall log parser or set up to run and configure ipfw. The major focus is parsing, compressing, and filtering *NIX (to include Mac OSX) firewall logs generated by IPFW for quick and easy admin review.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    pyid, extracts information (in real time) from IPTable`s logs (when modified) and notifies the user for the connections that have been dropped/rejected.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Schedule emailing of your Smoothwall logs. Schedule on a daily/weekly/monthly basis via cron jobs. Formatting options are text and html. csv formatting planned.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    The Plague provides a web UI to a MySQL db of parsed syslog data. The focus has been security reporting. The logs supported (so far) are NetScreen firewalls, Cisco routers and switches and PIXen, Gauntlet firewalls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attacker's IP into IPFW table effectively blocking them. Addresses are removed from the table after expiration period
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    readlog is a pair of scripts for reviewing iptables firewall logs via a handy web interface using a MySQL backend.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    adcfw-log is a tool for analyzing firewall logs in order to extract meaningful information and generate different kinds of reports, such as fully formatted reports of what had been logged, with summaries by source or destination host, the type of service
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Netfilter tracker is a tracking tool for iptables logs, similar to Checkpoint(tm) Smartview Tracker. Includes storage in an embedded SQL database and a graphical application (viewer) to access filtered data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    LogCop is a set of turn-key bash/firewall/awk scripts for enhancing an IDS. It monitors system logs and blocks IP addresses based on such criteria as illegal user names from repeated attacks. In production under Linux, FreeBSD, OS X, Solaris.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    IP Traffic Volume: Logs (counts) in- & outgoing bytes through network device(s) using kernel iptables. Highly configurable as to which bytes are logged, e.g. to/from specific ports or ip-addresses. Data displayed in html via cgi or plain ascii to console
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    FwPlatinum provides real time data analysis of CheckPoint FireWall-1 connection logs. Data is stored for up to 2 years, and is accessed by CGI generated graphs which can drill down to the specific time that you are interested in.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The Titan Firewall is an interface Web to manage firewall based on Linux with iptables. It supports filtrate of packages, NAT, logs, VPN's... Implemented in Java and jsp.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Pothos is an iptables log analyzer. It is used to interpret, in a user-friendly fashion, the logs that ulogd creates with it's MySQL plugin. It's main objective is to be efficient, leaving as small a foot-print as possible.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB