A defensive cybersecurity tool written in Python that analyzes Linux authentication logs to identify suspicious failed login attempts.
This project demonstrates foundational blue-team skills such as log analysis, pattern detection, and security awareness in Linux environments.
Authentication logs contain critical information about login activity on a system. Repeated failed login attempts may indicate brute-force attacks or unauthorized access attempts.
This tool:
- Parses system authentication logs
- Detects repeated failed login attempts
- Aggregates results by source IP
- Works on both Ubuntu/Debian and Kali Linux systems
- ✅ Read-only log analysis (safe & non-intrusive)
- ✅ Automatically detects available log sources
- ✅ Supports
/var/log/auth.logandjournalctl - ✅ Highlights suspicious IP addresses
- ✅ Simple CLI execution
- Python 3
- Linux authentication logs
- Regular expressions
journalctl(systemd)
- Attempts to read
/var/log/auth.log - If unavailable, falls back to
journalctl - Scans logs for failed SSH login attempts
- Counts occurrences per IP
- Displays suspicious activity
chmod +x log_analyzer.py