Paste up to 5 log lines and scan them instantly for suspicious activity.
Scanning log for suspicious activity...
Detect attack patterns, reconstruct timelines, and generate a full investigation report.