LogHQ monitors your nginx access logs for WordPress brute-force attacks, exploit scans, and sensitive data leaks. Deploy an agent in 30 seconds. See threats as they happen.
Every request that hits your nginx server is classified in real time. See exactly who is attacking, what they're after, and how your server responded.
Detects wp-login.php, xmlrpc.php, and login endpoint hammering. See which IPs are running credential stuffing attacks.
Catches path traversal, SQL injection probes, .bak/.sql file hunting, and plugin/theme vulnerability scanners.
Alerts when attackers probe for .env, .git, phpinfo, or wp-config. A 200 response means your data was exposed.
Every attacking IP is resolved to its country of origin. See which regions are targeting your servers on a live dashboard.
Get notified via Telegram, email, or audible browser alerts when attack velocity spikes or a server goes offline.
Filter threats by HTTP status. A 200 on a leak path is critical. A 403 means nginx blocked it. Focus on what matters.
No complex configuration. No port forwarding. The agent runs as a cron job under www-data and sends threat data to your dashboard over HTTPS.
Register on the dashboard and add a server. You'll get a unique agent key and a one-liner install command.
Run the install command on your server. The agent auto-discovers nginx log files and starts monitoring immediately.
curl -s https://loghq.net/agent/install.sh | bash -s -- YOUR_KEY
Threats appear within 60 seconds. See attacking IPs, categories, geo-location, and attack velocity in real time via WebSocket.
Start free with one server. Upgrade when your fleet grows.