|
| 1 | +--- |
| 2 | +title: "Gateway Hacker Traffic Logs" |
| 3 | +path: "/organizations/vpn-hacker-traffic-logs.html" |
| 4 | +id: "organizations/vpn-hacker-traffic-logs" |
| 5 | +--- |
| 6 | + |
| 7 | +This page describes hacker traffic logs that are available to download or sync to your data storage. |
| 8 | +See [this page](/organizations/hackerone-vpn.html#download-hacker-traffic-logs) for instructions on how to obtain these logs. |
| 9 | + |
| 10 | +Logs are provided in a newline-delimited JavaScript Object Notation (NDJSON) format. |
| 11 | +Three types of logs are available that are described in detail below: |
| 12 | +- [HTTP](#http) |
| 13 | +- [Network](#network) |
| 14 | +- [Network Session](#network-session) |
| 15 | + |
| 16 | +### HTTP |
| 17 | + |
| 18 | + Field | Description |
| 19 | +--------|------------ |
| 20 | +HTTP Host | Hostname in the HTTP header for the HTTP request. |
| 21 | +Email | Email address of the user who made the HTTP request. This is generated by the WARP client. |
| 22 | +Action | The Gateway Action taken based on the first rule that matched (for example, Allow or Block). |
| 23 | +Datetime | Date and time of the HTTP request. |
| 24 | +URL | Full URL of the HTTP request. |
| 25 | +Referer | Referer request header containing the address of the page making the request. |
| 26 | +HTTP Version | HTTP version of the origin that Gateway connected to on behalf of the user. |
| 27 | +HTTP Method | HTTP method used for the request (for example, GET or POST). |
| 28 | +HTTP Status Code | HTTP status code returned in the response. |
| 29 | +Destination IP | Public IP address of the destination requested. |
| 30 | +Destination Port | Port of the destination requested. |
| 31 | +User Agent | User agent header sent in the request by the originating device. |
| 32 | +Untrusted Certificate Action | Action taken when an untrusted origin certificate error occurs (for example, expired certificate, mismatched common name, invalid certificate chain, signed by non-public CA). One of **none**, **block**, **error** or **passThrough**. |
| 33 | +SessionID | The session identifier of this network session. |
| 34 | + |
| 35 | +### Network |
| 36 | + |
| 37 | +Field | Description |
| 38 | +------|------------ |
| 39 | +Destination IP | IP address of the packet’s target. |
| 40 | +Action | The Gateway Action taken based on the first rule that matched (for example, Allow or Block). |
| 41 | +Session ID | ID of the unique session. |
| 42 | +Datetime | Date and time of the session. |
| 43 | +Source Port | Source port number for the packet. |
| 44 | +SNI | Host whose Server Name Indication (SNI) header Gateway will filter traffic against. |
| 45 | +Email | Email address of the user sending the packet. |
| 46 | +OverrideIP | Overridden IP of the network session, if any. |
| 47 | +OverridePort | Overridden port of the network session, if any. |
| 48 | +Transport | Transport protocol used for this session. Possible values are **tcp**, **quic** and **udp**. |
| 49 | + |
| 50 | +### Network Session |
| 51 | + |
| 52 | +Field | Description |
| 53 | +------|------------ |
| 54 | +BytesReceived | The number of bytes sent from the origin to the client during the network session. |
| 55 | +BytesSent | The number of bytes sent from the client to the origin during the network session. |
| 56 | +ClientTCPHandshakeDurationMs | Duration of handshaking the TCP connection between the client and Cloudflare in milliseconds. |
| 57 | +ClientTLSCipher | TLS cipher suite used in the connection between the client and Cloudflare. |
| 58 | +ClientTLSHandshakeDurationMs | Duration of handshaking the TLS connection between the client and Cloudflare in milliseconds. |
| 59 | +ClientTLSVersion | TLS protocol version used in the connection between the client and Cloudflare. |
| 60 | +ConnectionCloseReason | The reason for closing the connection, only applicable for TCP. Possible values are **clientClosed**, **originClosed**, **timeout**, **clientTcpError**, **clientTlsError**, **originTcpError** and **originTlsError**. |
| 61 | +ConnectionReuse | Whether the TCP connection was reused for multiple HTTP requests. |
| 62 | +EgressColoName | The name of the Cloudflare colocation from which traffic egressed to the origin. |
| 63 | +EgressIP | Source IP used when egressing traffic from Cloudflare to the origin. |
| 64 | +EgressPort | Source port used when egressing traffic from Cloudflare to the origin. |
| 65 | +Email | [Email address alias](/hackers/hacker-email-alias.html) associated with the user identity which initiated the network session. |
| 66 | +IngressColoName | The name of the Cloudflare colocation to which traffic ingressed. |
| 67 | +Offramp | The type of destination to which the network session was routed. Possible values are **internet**, **magic**, **cfd_tunnel** and **WARP**. |
| 68 | +OriginIP | The IP of the destination origin for the network session. |
| 69 | +OriginPort | The port of the destination origin for the network session. |
| 70 | +OriginTLSCertificateIssuer | The issuer of the origin TLS certificate. |
| 71 | +OriginTLSCertificateValidationResult | The result of validating the TLS certificate of the origin. Possible values are **valid**, **expired**, **revoked** and **hostnameMismatch**. |
| 72 | +OriginTLSCipher | TLS cipher suite used in the connection between Cloudflare and the origin. |
| 73 | +OriginTLSHandshakeDurationMs | Duration of handshaking the TLS connection between Cloudflare and the origin in milliseconds. |
| 74 | +OriginTLSVersion | TLS protocol version used in the connection between Cloudflare and the origin. |
| 75 | +Protocol | Network protocol used for this network session. Possible values are **tcp**, **udp**, **icmp** and **icmpv6**. |
| 76 | +SessionEndTime | The network session end timestamp with nanosecond precision. |
| 77 | +SessionID | The identifier of this network session. |
| 78 | +SessionStartTime | The network session start timestamp with nanosecond precision. |
0 commit comments