Skip to content

lucianoscarpaci/LogSpear

Repository files navigation

LogSpear

IoT Botnet Detection & Forensic Analysis Tool

A forensic tool designed for SOC Analysts to identify suspicious IoT devices involved in botnets through intelligent log analysis.

medium

305 Hackathon Miami March. 2026

Track #1 - Hackathon Competition - General Build Track #2 - Business Venture Arena Competition Opt-in Challenge #1 Opt-in Challenge #2 Opt-in Challenge #3

Inspiration

This forensic tool was designed for SOC Analysts who want to find suspicious IoT devices that have been used in Botnets through their log scans. The faster the SOC can find the infected IoT devices such as CCTV's and EV charging stations on the network, they can prevent future devices from becoming infected.

What it does

An LLM-powered incident summarizer. Users upload their log files to the chatbot interface to find the suspicious IP, Machine Information, Country of where the botnet is from, and a visualization in a graph of the botnet-like devices connected to it.

How we built it

We built it using an AI Agent with Chainlit, OpenAI API, and LangChain.

Key Features

  • IoT Device Detection: Identifies suspicious IoT devices (CCTV cameras, EV charging stations, etc.) used in botnets
  • Comprehensive Analysis: Extracts suspicious IP addresses, machine information, and country of origin
  • Visual Intelligence: Graph visualization showing botnet-like devices and their connections
  • Chatbot Interface: User-friendly Chainlit interface for uploading and analyzing log files
  • Fast Threat Detection: Helps SOCs neutralize threats before additional devices become infected

Challenges we ran into

The main challenge was setting up Chainlit web interface with langchain and coming up with the correct log files to analyze.

Accomplishments that we're proud of

I am proud of helping Cybersecurity Analysts find these networks before they form and neutralize the threat before future devices get infected.

What we learned

I learned how to use chainlit and langchain to help cybersecurity SOCs.

Tech Stack

  • LLM Framework: LangChain
  • Interface: Chainlit
  • Language: Python
  • Data Parsing: JSON parsing with Python
  • Visualization: Plotly for network graph visualization

What's next for LogSpear

Integrating local, proprietary models, so that the data never leaves the network.

Getting Started

Start the Python venv in your shell and install the packages from the requirements.txt file with pip. source venv/bin/activate && pip install -r requirements.txt Run the application with chainlit: chainlit run app/LogSpear/app.py

Demo video

YouTube

Screenshots

Screenshot 1 Screenshot 2 Screenshot 3

License

MIT License See LICENSE file for details.

About

Smart Parsing. Human Understanding.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages