Nginx 404 Not Found — Missing Resource Detection

WebServerErrors Nginx Reconnaissance / Scanning

What This Means

Analyze Nginx 404 Not Found errors. Identify web vulnerability scanning, broken links, and automated reconnaissance targeting your Nginx server infrastructure.

Example Log

198.51.100.77 - - [08/Mar/2026:16:15:22 +0000] "GET /wp-login.php HTTP/1.1" 404 548 "-" "Mozilla/5.0 (compatible; Googlebot/2.1)"

Indicators of Suspicious Activity

How to Investigate

  1. Group Nginx access log 404 responses by source IP and URI pattern
  2. Verify claimed Googlebot requests using reverse DNS lookup on the source IP
  3. Check if any scanning IPs also made successful (200) requests
  4. Compare 404 patterns against known vulnerability scanner signatures
  5. Review rate of 404 generation per IP per minute
  6. Correlate with fail2ban logs to see if the IP was already flagged

Recommended Mitigations

Scan This Log Instantly

Paste a suspicious log line below and get an instant AI-powered security assessment.

0 / 2000

Need a Full Investigation?

Scan entire log files, detect attack patterns, reconstruct timelines, and generate a full investigation report.

Run Smart Scan

Related Log Types

Related Attack Patterns

Frequently Asked Questions

How do I reduce 404 noise in Nginx logs?
Use Nginx access_log conditional logging to separate 404s into a dedicated log file. You can also use map directives to suppress logging for known benign 404 patterns like favicon.ico.
How does fail2ban work with Nginx 404s?
fail2ban monitors Nginx access logs for 404 patterns. When an IP exceeds your threshold (e.g., 20 404s in 5 minutes), fail2ban adds an iptables rule to block that IP for a configurable duration.
Should I worry about 404s from search engine bots?
Legitimate bot 404s indicate broken links that should be fixed or redirected. However, verify the bot is genuine using reverse DNS — many attackers fake Googlebot User-Agent strings.