do these log entries document attacks?