Reverse Proxy Access Logs
NetBird logs every request and connection that passes through your reverse proxy services, including both HTTP and L4 (TCP, UDP, TLS) traffic. Access logs provide visibility into who is accessing your services, from where, and whether requests were allowed or denied. This is useful for auditing, debugging, and monitoring traffic to your publicly exposed services.
Viewing access logs
Access logs are available in the NetBird dashboard under Activity > Proxy Events. This view displays a table of all HTTP requests and L4 connections that have passed through your reverse proxy services, with filters to narrow down results by time range, status, or other fields.

You can also retrieve access logs programmatically using the API:
GET /api/events/proxy
What access logs capture
Every log entry (HTTP and L4) shares a common set of fields. Some fields are only meaningful for certain protocols.
| Field | Description | HTTP | L4 (TCP/UDP/TLS) |
|---|---|---|---|
| Timestamp | When the request or connection occurred | Yes | Yes |
| Protocol | http, tcp, udp, or tls | Yes | Yes |
| Method | HTTP method (GET, POST, etc.). For L4, displays the protocol name. | Yes | Protocol name |
| Host / URL | Domain and path for HTTP. Host and listen port for L4. | host/path | host:port |
| Status Code | HTTP status code (200, 401, 403, 500, etc.) | Yes | Empty |
| Duration | Request or connection duration in milliseconds | Yes | Yes |
| Bytes Uploaded | Bytes sent from client to backend | Yes | Yes |
| Bytes Downloaded | Bytes sent from backend to client | Yes | Yes |
| Source IP | The client's IP address | Yes | Yes |
| Location | Country, city, and subdivision based on source IP geolocation | Yes | Yes |
| Auth Method | Authentication method used (SSO, password, PIN, header, or none) | Yes | N/A |
| User | The authenticated user's ID (if SSO was used) | Yes | N/A |
| Reason | Reason for denial, if applicable | Yes | Yes |
Understanding log entries
HTTP log entries
HTTP log entries fall into three categories based on the status code:
- Allowed requests: successful requests show a
2xxstatus code along with the authentication method used to access the service. - Denied requests: failed authentication or access restriction blocks show
401or403status codes with a reason explaining why the request was denied (e.g., invalid password, missing SSO session, IP restricted, country restricted). - Errors: backend errors or proxy issues show
5xxstatus codes. These typically indicate that the target service is unreachable or returned an error.
L4 log entries
L4 entries are logged when the connection closes and record the total bytes transferred in each direction and the connection duration. L4 entries do not have HTTP status codes.
Denied L4 connections (blocked by access restrictions) are logged immediately with a deny reason. Since L4 services do not support authentication, denials come from access restrictions only.
Deny reasons
The following deny reasons can appear for both HTTP and L4 services:
| Reason | Description |
|---|---|
ip_restricted | The client IP was blocked by a CIDR access restriction |
country_restricted | The client's country was blocked by a country access restriction |
geo_unavailable | Country restrictions are configured but the GeoIP database is unavailable (fail-closed) |
Use cases
Access logs support several operational and security workflows:
- Security auditing - Review who accessed sensitive services, which authentication method they used, and from which geographic locations. This helps identify unauthorized access attempts and verify that authentication policies are working as expected.
- Debugging - Trace failed requests to understand authentication or routing issues. The status code, duration, and reason fields help pinpoint whether problems originate from authentication configuration, target availability, or network connectivity.
- Monitoring - Track usage patterns across your services. Identify which services receive the most traffic, peak usage times, and unusual access patterns that may warrant investigation.
- Compliance - Maintain records of service access for regulatory requirements. Access logs provide an auditable trail of who accessed what, when, and from where.
Related pages
- Reverse Proxy Overview - learn how to create and manage reverse proxy services
- Audit Events Logging - view management-level events such as configuration changes and user activity
- Traffic Events Logging - monitor network-level traffic events across your NetBird mesh

