Kontakt

hs-icon-callcenter
Anrufen
hs-icon-callcenter

Rufen Sie uns an

Unser Support-Team hilft Ihnen gerne, egal ob Sie technische oder administrative Fragen haben. Wir sind persönlich für Sie da!

 

+41 (0)84 800 80 80
(Anrufe aus der Schweiz 8 Rappen/Minute)

Administration

Montag bis Freitag
9.00–12.00 Uhr
13.30–17.30 Uhr
 

Technischer Support

Montag bis Freitag
8.00–17.30 Uhr

Samstag
9.00–16.00 Uhr

hs-icon-doc-write
Schreiben
hs-icon-doc-write

Schreiben Sie uns

Damit wir Ihnen so rasch und so gut wie möglich helfen können, bitten wir Sie Ihre Anfrage so spezifisch wie möglich zu formulieren. Sie können uns auch gerne über unsere E-Mail-Adresse erreichen: support@hoststar.com

Alle mit einem «*» markierten Felder sind Pflichtfelder und müssen ausgefüllt werden.

 

Access-Log

Support > > PHP

The access.log file on your web server logs all access to your website. It contains information about every request sent to the server, such as IP addresses, requested URLs, timestamps, and status codes. With the access.log file, you can monitor traffic on your site, identify errors, or track security incidents. 

What is the access.log?

The access.log is a log file that records every access to your website. It contains useful information such as: 

  • IP address of the visitor. 
  • Date and time of the access. 
  • Requested URL (which page or file was requested). 
  • HTTP status code (whether the access was successful, e.g., 200, or if an error occurred, e.g., 404). 
  • Browser information of the visitor. 

How do I access the access.log?

At Hoststar, you can access the access.log file through your FTP account. The file is located in the directory of your web server, under /logs/. 

Security Note

The access.log can contain sensitive information, such as IP addresses and browser details. Ensure that access to these logs is restricted to authorized users only. 

By using the access.log file, you can gain valuable insights into the usage of your website, while also identifying errors and addressing potential security risks. 

War dieser Artikel hilfreich?