Fuzzy hashing logs to find malicious activity