bump
.
in
.
the
.
log
New investigation
Sample investigation
buy_me_a_coffee
New investigation
paste → parse → reconstruct
log source
Auto-detect
AWS CloudTrail
Azure Activity Log
GCP Audit Log
Auth logs (auth.log / secure)
Web server access (Apache/Nginx)
Web server errors
Windows Event Log
EDR alerts (CrowdStrike/SentinelOne/Defender)
Syslog (generic)
Application logs (JSON)
Firewall (pf/iptables)
VPN
Other
0 lines
what are you investigating?
(dramatically improves output quality)
Redact internal hostnames, employee names, and customer identifiers before submission. Log content is sent to a third-party AI provider for analysis.
Redact
Find the Bumps
first pass preview
Paste 10+ log lines to see detected entities, time range, and a parsing sanity check.