Free Online Log Explorer
Local-only. Paste logs or drop a file. Parse → search → filter → aggregate → export.
Drop a .log/.txt/.ndjson here (client-side) or use the picker:
Idle.
Read: 0 Lines: 0
Search (supports: text, field:value, AND, OR)
Level
Start (optional)
End (optional)
Parsed: 0 Showing: 0
Paste logs / NDJSON / JSON lines
Parse common formats (JSON lines, key=value, syslog-ish). Filter by time range, severity, and simple queries. Export results as JSON or CSV.

About this tool

This free online log explorer lets you parse, search, filter, and aggregate logs directly in your browser. Paste text or drop .log/.txt/.ndjson files to inspect events fast without uploading data to a server. It’s built for debugging production incidents, analyzing application output, and exploring structured or semi-structured logs with simple query syntax.

Common use cases

  • Search logs with text queries, field:value, and AND/OR conditions
  • Filter events by time range and severity (error/warn/info/debug)
  • Review NDJSON / JSON lines from services, proxies, and cloud platforms
  • Aggregate counts by level and spot spikes with per-minute buckets
  • Export filtered results to JSON or CSV for tickets, reports, or follow-up analysis

How it works

Parsing and filtering run client-side. The tool streams file reads, tokenizes common formats (NDJSON, key=value, syslog-ish), and normalizes fields like time, level, source, and message. Queries support free text plus simple field matching. Results are sorted with recent events first, and aggregates (counts + buckets) are computed from the filtered set. Because everything executes in your browser, your log data stays on your machine.

FAQ

Does this tool upload my logs anywhere?

No. Parsing, searching, and exporting all happen locally in your browser.

What formats does it support?

It parses NDJSON/JSON lines, key=value logs, and common “syslog-like” lines, and still lets you search raw text when fields aren’t present.

How do I search specific fields?

Use field:value terms (for example level:error or source:nginx) combined with AND/OR.