Security Threats Log

Why Monitoring Security Threats Matters

Websites are continuously targeted by automated scanners and attack bots that probe for known vulnerabilities, common file paths, and exploitable endpoints.

WP Ghost prevents these attacks proactively by reducing your site’s attack surface and blocking malicious requests before they reach WordPress.
The Security Threats Log gives you full visibility into this hostile traffic, allowing you to understand what is being targeted, from where, and how often.

This log focuses exclusively on external threats, not user activity.

Activate Security Threats Log

  1. Go to WP Ghost > Logs > Settings.
  2. Enable Log Security Threats.
  3. Select how long to keep logs locally using Retention (in days).
  4. Click Save to apply the changes.
Security Threats Log

Once enabled, WP Ghost automatically starts recording detected threats. No additional configuration is required.

What Is Logged as a Security Threat

The Security Threats Log records malicious or suspicious requests detected by WP Ghost protections, including:

  • Probing for vulnerable or non-existent PHP files
  • Exploit scanning against plugins, themes, or core files
  • Requests targeting hidden or protected technical paths
  • Malformed or suspicious HTTP requests
  • Repeated hostile traffic from the same IP address

Each log entry documents attempted attacks, even when they are fully blocked.

Security Threats Log GDPR & Data Storage

When the Security Threats Log is enabled, all detected threats are stored locally in the WordPress database table hmwp_logs.

Stored data includes:

  • Threat type
  • Targeted path or URL
  • Source IP address and country
  • HTTP method and protocol
  • Detection rule and matched pattern
  • Date and time
  • Block status (for example: Prevented)

This data is collected strictly for security monitoring and incident analysis.

Security Threats Log Report

You can view detected threats at:

WP Ghost > Logs > Security Threats

Security Threats Log Report

From this screen, you can:

  • See all detected threats in chronological order
  • Identify attack types and targeted paths
  • View source IPs and countries
  • Confirm whether threats were blocked
  • Detect recurring or coordinated attack patterns

This report helps validate that WP Ghost protections are working as intended.

Filter and Search the Threats Report

The Threats Report includes built-in tools to help you analyze activity:

  • Filter by Threat Type to isolate specific attack vectors
  • Filter by Status (for example: Prevented)
  • Filter by Time Range to investigate recent incidents
  • Search by keyword, path, or IP address
Security Threats Filter

These filters allow you to quickly pinpoint relevant security events without scrolling through large datasets.

Threat Actions and Response Options

Each threat entry includes an action menu that lets you respond immediately.

Threat Details

Security Threat Detail

Selecting Threat Details opens a detailed view showing:

  • Full request path
  • Source IP address
  • HTTP status returned
  • Detection rule and matched pattern
  • User agent and referrer
  • Protocol and request metadata
  • Unique request ID

This information is essential for understanding why the request was flagged and how WP Ghost handled it.

Whitelist Path

Whitelist Threat Path

Use Whitelist Path if a legitimate request is being blocked and you want to allow access to a specific URL or endpoint.

Whitelisted paths are managed in:
WP Ghost > Firewall > Whitelist

Whitelist Rule

Use Whitelist Rule to allow requests that match a specific detection rule or pattern.

Whitelist Threat Rule

This is useful for trusted integrations or custom applications that trigger security rules unintentionally.

Whitelist rules are managed in:
WP Ghost > Firewall > Whitelist

Blacklist IP

Use Blacklist IP to permanently block a malicious IP address that repeatedly targets your site.

Blacklist Threat IP

Blacklisted IPs are managed in:
WP Ghost > Firewall > Blacklist

Manage Whitelist and Blacklist Entries

All whitelist and blacklist entries created from the Threats Log are centrally managed in the Firewall section:

  • Firewall > Whitelist
    • Whitelisted paths
    • Whitelisted detection rules
  • Firewall > Blacklist
    • Blocked IP addresses

This ensures a single, consistent place to manage all firewall exceptions and blocks.