Log Line analysis
After breaking down log file activity by user, you can also go into an individual log line. We detail how we interpreted that log line including country and city of origin and where any issues were found such as a malicious url or a sql injection attack via url, useragent or referrer.