Lightweight real-time ModSecurity monitoring console for Linux servers.
Designed for Apache, CWAF and StopBadBots environments, MSLC provides fast terminal-based inspection of ModSecurity activity without external Python dependencies or heavy frameworks.
The project focuses on operational simplicity, low resource usage and quick incident visibility directly from production servers.
- Real-time ModSecurity audit monitoring
- Top blocked IP detection
- Daily attack summaries
- Top blocked URLs
- Lightweight terminal interface
- No external Python dependencies
- Optimized for Linux servers
- Designed for Apache/CWAF environments
- Compatible with custom ModSecurity rule sets
- Built to work together with StopBadBots and additional Comodo WAF rules
bin/mslc-console.sh Main terminal menu
bin/mslc-live-monitor.py Real-time formatted ModSecurity audit monitor
bin/mslc-rules-today.py ModSecurity rules triggered today
bin/mslc-rules-yesterday.py ModSecurity rules triggered yesterday
bin/mslc-rule-totals.py Daily totals from ModSecurity audit logs
bin/mslc-top-urls-today.py Top blocked URLs for today
bin/mslc-top-ips.sh Top Ips blocked now
conf/mslc.conf Default configuration reference
install.sh Installer
uninstall.sh Uninstaller
sudo ./install.shThen run:
mslcThe only required adjustment is the ModSecurity audit log path.
Default path used by MSLC:
/usr/local/apache/logs/modsec_audit.log
---
## Requirements
- Bash
- Python 3
- Standard Linux tools:
- `awk`
- `grep`
- `tail`
- `sort`
- `uniq`
- `head`
- `watch`
Default environment:
- Apache
- ModSecurity
- CWAF / Comodo WAF
- Linux server
---
## Default Log Paths
```text
/usr/local/apache/logs/access_log
/usr/local/apache/logs/modsec_audit.log
1) Top 10 blocked IPs (403)
2) Live ModSecurity audit monitor
3) ModSecurity totals by date
4) ModSecurity rules triggered today
5) ModSecurity rules triggered yesterday
6) Top URLs blocked today
7) About
8) Exit
MSLC was designed to work with:
- Comodo WAF / CWAF
- StopBadBots rules
- Custom ModSecurity rules
- Additional defensive ModSecurity configurations
The console parses and formats audit log events generated by these environments.
MSLC focuses on operational simplicity.
It is intentionally lightweight and terminal-oriented, designed for fast incident inspection directly on production Linux servers.
This is not intended to replace a SIEM platform. The goal is quick visibility, rapid investigation and low-overhead monitoring.
- CentOS
- AlmaLinux
- Rocky Linux
- CWP (CentOS Web Panel)
- Apache + ModSecurity
- CWAF
This tool is intended for defensive system administration and security log analysis only.
GPL v3
Copyright (c) 2026 Bill Minozzi
