We log every request for security reasons, however, we will only look into those logs if we have to, for example, because we are under a ddos attack and have to fiqure out who actually participated in that attack. Also, we rarely look into those logs to spot any hacking attempts.