input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"54.140.107.96","externalIp":"138.255.38.10","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-07T18:29:26.000Z"} ::: clientIP=54.140.107.96 ::: serverIP=138.255.38.10 ::: userName=janedoe ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-07T18:29:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: imp.onesearch.org
messagetype: firewall_action
severitycode: 2
fqdn: imp.onesearch.org
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 54.140.107.96
serverIP: 138.255.38.10
userName: janedoe
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"148.129.207.8","externalIp":"1.142.178.18","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-07T18:29:26.000Z"} ::: clientIP=148.129.207.8 ::: serverIP=1.142.178.18 ::: userName=charlie ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-07T18:29:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"148.129.207.8\",\"externalIp\":\"1.142.178.18\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"imp.onesearch.org\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-07T18:29:26.000Z\"} ::: clientIP=148.129.207.8 ::: serverIP=1.142.178.18 ::: userName=charlie ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "imp.onesearch.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "imp.onesearch.org",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "148.129.207.8",
"serverIP": "1.142.178.18",
"userName": "charlie"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"148.129.207.8","externalIp":"1.142.178.18","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-07T18:29:26.000Z"} ::: clientIP=148.129.207.8 ::: serverIP=1.142.178.18 ::: userName=charlie ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"148.129.207.8","externalIp":"1.142.178.18","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-07T18:29:26.000Z"} ::: clientIP=148.129.207.8 ::: serverIP=1.142.178.18 ::: userName=charlie ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-07T18:29:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: imp.onesearch.org
messagetype: firewall_action
severitycode: 2
fqdn: imp.onesearch.org
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 148.129.207.8
serverIP: 1.142.178.18
userName: charlie
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410614320,"originType":"AD Users","internalIp":"233.202.178.225","externalIp":"21.115.212.60","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=233.202.178.225 ::: serverIP=21.115.212.60 ::: userName=charlie ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T16:12:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={\"originId\":410614320,\"originType\":\"AD Users\",\"internalIp\":\"233.202.178.225\",\"externalIp\":\"21.115.212.60\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.clarityacademy.net\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T16:12:01.000Z\"} ::: clientIP=233.202.178.225 ::: serverIP=21.115.212.60 ::: userName=charlie ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.clarityacademy.net",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.clarityacademy.net",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "233.202.178.225",
"serverIP": "21.115.212.60",
"userName": "charlie"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410614320,"originType":"AD Users","internalIp":"233.202.178.225","externalIp":"21.115.212.60","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=233.202.178.225 ::: serverIP=21.115.212.60 ::: userName=charlie ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410614320,"originType":"AD Users","internalIp":"233.202.178.225","externalIp":"21.115.212.60","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=233.202.178.225 ::: serverIP=21.115.212.60 ::: userName=charlie ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T16:12:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.clarityacademy.net
messagetype: firewall_action
severitycode: 2
fqdn: www.clarityacademy.net
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 233.202.178.225
serverIP: 21.115.212.60
userName: charlie
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410614320,"originType":"AD Users","internalIp":"23.253.199.232","externalIp":"132.16.96.181","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=23.253.199.232 ::: serverIP=132.16.96.181 ::: userName=nighthawk ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T16:12:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={\"originId\":410614320,\"originType\":\"AD Users\",\"internalIp\":\"23.253.199.232\",\"externalIp\":\"132.16.96.181\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.clarityacademy.net\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T16:12:01.000Z\"} ::: clientIP=23.253.199.232 ::: serverIP=132.16.96.181 ::: userName=nighthawk ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.clarityacademy.net",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.clarityacademy.net",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "23.253.199.232",
"serverIP": "132.16.96.181",
"userName": "nighthawk"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410614320,"originType":"AD Users","internalIp":"23.253.199.232","externalIp":"132.16.96.181","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=23.253.199.232 ::: serverIP=132.16.96.181 ::: userName=nighthawk ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410614320,"originType":"AD Users","internalIp":"23.253.199.232","externalIp":"132.16.96.181","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=23.253.199.232 ::: serverIP=132.16.96.181 ::: userName=nighthawk ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T16:12:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.clarityacademy.net
messagetype: firewall_action
severitycode: 2
fqdn: www.clarityacademy.net
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 23.253.199.232
serverIP: 132.16.96.181
userName: nighthawk
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410614320,"originType":"AD Users","internalIp":"9.106.89.156","externalIp":"244.224.144.205","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=9.106.89.156 ::: serverIP=244.224.144.205 ::: userName=bob ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T16:12:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={\"originId\":410614320,\"originType\":\"AD Users\",\"internalIp\":\"9.106.89.156\",\"externalIp\":\"244.224.144.205\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.clarityacademy.net\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T16:12:01.000Z\"} ::: clientIP=9.106.89.156 ::: serverIP=244.224.144.205 ::: userName=bob ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.clarityacademy.net",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.clarityacademy.net",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "9.106.89.156",
"serverIP": "244.224.144.205",
"userName": "bob"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410614320,"originType":"AD Users","internalIp":"9.106.89.156","externalIp":"244.224.144.205","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=9.106.89.156 ::: serverIP=244.224.144.205 ::: userName=bob ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410614320,"originType":"AD Users","internalIp":"9.106.89.156","externalIp":"244.224.144.205","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=9.106.89.156 ::: serverIP=244.224.144.205 ::: userName=bob ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T16:12:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.clarityacademy.net
messagetype: firewall_action
severitycode: 2
fqdn: www.clarityacademy.net
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 9.106.89.156
serverIP: 244.224.144.205
userName: bob
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410614320,"originType":"AD Users","internalIp":"80.142.133.170","externalIp":"59.198.245.48","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=80.142.133.170 ::: serverIP=59.198.245.48 ::: userName=janedoe ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T16:12:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={\"originId\":410614320,\"originType\":\"AD Users\",\"internalIp\":\"80.142.133.170\",\"externalIp\":\"59.198.245.48\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.clarityacademy.net\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T16:12:01.000Z\"} ::: clientIP=80.142.133.170 ::: serverIP=59.198.245.48 ::: userName=janedoe ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.clarityacademy.net",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.clarityacademy.net",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "80.142.133.170",
"serverIP": "59.198.245.48",
"userName": "janedoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410614320,"originType":"AD Users","internalIp":"80.142.133.170","externalIp":"59.198.245.48","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=80.142.133.170 ::: serverIP=59.198.245.48 ::: userName=janedoe ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410614320,"originType":"AD Users","internalIp":"80.142.133.170","externalIp":"59.198.245.48","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=80.142.133.170 ::: serverIP=59.198.245.48 ::: userName=janedoe ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T16:12:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.clarityacademy.net
messagetype: firewall_action
severitycode: 2
fqdn: www.clarityacademy.net
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 80.142.133.170
serverIP: 59.198.245.48
userName: janedoe
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"179.41.123.99","externalIp":"176.238.175.215","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-30T14:43:45.000Z"} ::: clientIP=179.41.123.99 ::: serverIP=176.238.175.215 ::: userName=nighthawk ::: created_at=2022-05-30T14:43:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-30T14:43:45.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-30T14:43:45.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"179.41.123.99\",\"externalIp\":\"176.238.175.215\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-30T14:43:45.000Z\"} ::: clientIP=179.41.123.99 ::: serverIP=176.238.175.215 ::: userName=nighthawk ::: created_at=2022-05-30T14:43:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-30T14:43:45.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "179.41.123.99",
"serverIP": "176.238.175.215",
"userName": "nighthawk"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"179.41.123.99","externalIp":"176.238.175.215","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-30T14:43:45.000Z"} ::: clientIP=179.41.123.99 ::: serverIP=176.238.175.215 ::: userName=nighthawk ::: created_at=2022-05-30T14:43:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-30T14:43:45.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"179.41.123.99","externalIp":"176.238.175.215","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-30T14:43:45.000Z"} ::: clientIP=179.41.123.99 ::: serverIP=176.238.175.215 ::: userName=nighthawk ::: created_at=2022-05-30T14:43:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-30T14:43:45.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-30T14:43:45.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 179.41.123.99
serverIP: 176.238.175.215
userName: nighthawk
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"40.84.229.113","externalIp":"204.240.94.60","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-30T14:43:45.000Z"} ::: clientIP=40.84.229.113 ::: serverIP=204.240.94.60 ::: userName=charlie ::: created_at=2022-05-30T14:43:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-30T14:43:45.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-30T14:43:45.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"40.84.229.113\",\"externalIp\":\"204.240.94.60\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-30T14:43:45.000Z\"} ::: clientIP=40.84.229.113 ::: serverIP=204.240.94.60 ::: userName=charlie ::: created_at=2022-05-30T14:43:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-30T14:43:45.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "40.84.229.113",
"serverIP": "204.240.94.60",
"userName": "charlie"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"40.84.229.113","externalIp":"204.240.94.60","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-30T14:43:45.000Z"} ::: clientIP=40.84.229.113 ::: serverIP=204.240.94.60 ::: userName=charlie ::: created_at=2022-05-30T14:43:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-30T14:43:45.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"40.84.229.113","externalIp":"204.240.94.60","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-30T14:43:45.000Z"} ::: clientIP=40.84.229.113 ::: serverIP=204.240.94.60 ::: userName=charlie ::: created_at=2022-05-30T14:43:45.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-30T14:43:45.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-30T14:43:45.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 40.84.229.113
serverIP: 204.240.94.60
userName: charlie
|
Explain this syslog message
|
<185>Jul 17 10:56:34 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=127.166.152.83 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=233.140.38.68 spt=57776 requestMethod="-" app=HTTP requestContext="-" start=Jul 17 2024 10:56:34 rt=1721231794069 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190c168df95-9bbfd200 cn2=57776 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=233.140.38.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 57776,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1721231794069 ",
"message": "<185>Jul 17 10:56:34 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=127.166.152.83 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser=\"-\" src=233.140.38.68 spt=57776 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 17 2024 10:56:34 rt=1721231794069 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190c168df95-9bbfd200 cn2=57776 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=233.140.38.68 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:172.214.115.102",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "233.140.38.68",
"serverIP": "127.166.152.83",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 17 10:56:34 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=127.166.152.83 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=233.140.38.68 spt=57776 requestMethod="-" app=HTTP requestContext="-" start=Jul 17 2024 10:56:34 rt=1721231794069 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190c168df95-9bbfd200 cn2=57776 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=233.140.38.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 17 10:56:34 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=127.166.152.83 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=233.140.38.68 spt=57776 requestMethod="-" app=HTTP requestContext="-" start=Jul 17 2024 10:56:34 rt=1721231794069 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190c168df95-9bbfd200 cn2=57776 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=233.140.38.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 57776
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1721231794069
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:172.214.115.102', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 233.140.38.68
serverIP: 127.166.152.83
userName: -
|
Explain this syslog message
|
<185>Jul 17 10:56:34 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=193.173.203.244 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=227.55.17.149 spt=57776 requestMethod="-" app=HTTP requestContext="-" start=Jul 17 2024 10:56:34 rt=1721231794069 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190c168df95-9bbfd200 cn2=57776 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=227.55.17.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 57776,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1721231794069 ",
"message": "<185>Jul 17 10:56:34 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=193.173.203.244 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser=\"-\" src=227.55.17.149 spt=57776 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 17 2024 10:56:34 rt=1721231794069 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190c168df95-9bbfd200 cn2=57776 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=227.55.17.149 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:172.214.115.102",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "227.55.17.149",
"serverIP": "193.173.203.244",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 17 10:56:34 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=193.173.203.244 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=227.55.17.149 spt=57776 requestMethod="-" app=HTTP requestContext="-" start=Jul 17 2024 10:56:34 rt=1721231794069 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190c168df95-9bbfd200 cn2=57776 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=227.55.17.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 17 10:56:34 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=193.173.203.244 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=227.55.17.149 spt=57776 requestMethod="-" app=HTTP requestContext="-" start=Jul 17 2024 10:56:34 rt=1721231794069 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190c168df95-9bbfd200 cn2=57776 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=227.55.17.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 57776
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1721231794069
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:172.214.115.102', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 227.55.17.149
serverIP: 193.173.203.244
userName: -
|
Explain this syslog message
|
<185>Jul 17 10:56:34 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=159.248.213.227 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=218.87.107.237 spt=57776 requestMethod="-" app=HTTP requestContext="-" start=Jul 17 2024 10:56:34 rt=1721231794069 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190c168df95-9bbfd200 cn2=57776 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=218.87.107.237 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 57776,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1721231794069 ",
"message": "<185>Jul 17 10:56:34 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=159.248.213.227 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser=\"-\" src=218.87.107.237 spt=57776 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 17 2024 10:56:34 rt=1721231794069 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190c168df95-9bbfd200 cn2=57776 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=218.87.107.237 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:172.214.115.102",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "218.87.107.237",
"serverIP": "159.248.213.227",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 17 10:56:34 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=159.248.213.227 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=218.87.107.237 spt=57776 requestMethod="-" app=HTTP requestContext="-" start=Jul 17 2024 10:56:34 rt=1721231794069 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190c168df95-9bbfd200 cn2=57776 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=218.87.107.237 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 17 10:56:34 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=159.248.213.227 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=218.87.107.237 spt=57776 requestMethod="-" app=HTTP requestContext="-" start=Jul 17 2024 10:56:34 rt=1721231794069 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190c168df95-9bbfd200 cn2=57776 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=218.87.107.237 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 57776
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1721231794069
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:172.214.115.102', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 218.87.107.237
serverIP: 159.248.213.227
userName: -
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-01T06:46:46.972Z","agent":{"ephemeral_id":"54f9c4d3-b89b-418e-9563-3a37a2649e9b","id":"c1a9836f-a0ae-477f-9125-47ef8fc5a674","name":"AWeb02","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-01T06:46:47.881Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"AWeb02"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"10.0.0.102","sensitivity":"normal","winlog":{"activity_id":"{b7efd1f2-42f6-4c1c-b5da-68fcdc9bb3ae}","api":"wineventlog","channel":"Security","computer_name":"AWeb02","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"nighthawk","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":996}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":2707915,"task":"Special Logon"}}
|
{
"senderhost": "10.0.0.102",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4672",
"microsoft-windows-security-auditing",
"security_privilege_change"
],
"productids": [
43
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-01T06:46:46.972Z\",\"agent\":{\"ephemeral_id\":\"54f9c4d3-b89b-418e-9563-3a37a2649e9b\",\"id\":\"c1a9836f-a0ae-477f-9125-47ef8fc5a674\",\"name\":\"AWeb02\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Special Logon\",\"code\":\"4672\",\"created\":\"2022-08-01T06:46:47.881Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"AWeb02\"},\"log\":{\"level\":\"information\"},\"message\":\"Special privileges assigned to new logon.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tNT AUTHORITY\\n\\tLogon ID:\\t\\t0x3E7\\n\\nPrivileges:\\t\\tSeAssignPrimaryTokenPrivilege\\n\\t\\t\\tSeTcbPrivilege\\n\\t\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeAuditPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"organization\":\"WAYNE (wayne.waynecloud.com)\",\"senderHost\":\"10.0.0.102\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{b7efd1f2-42f6-4c1c-b5da-68fcdc9bb3ae}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"AWeb02\",\"event_data\":{\"PrivilegeList\":\"SeAssignPrimaryTokenPrivilege\\n\\t\\t\\tSeTcbPrivilege\\n\\t\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeAuditPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"SubjectDomainName\":\"NT AUTHORITY\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"nighthawk\",\"SubjectUserSid\":\"S-1-5-18\"},\"event_id\":\"4672\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":712,\"thread\":{\"id\":996}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":2707915,\"task\":\"Special Logon\"}}",
"sensitivity": "normal",
"messagetype": "security_privilege_change",
"vendorcode": "2707915",
"action": "Special Logon",
"streamName": "microsoft-windows-security-auditing",
"userName": "nighthawk"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-01T06:46:46.972Z","agent":{"ephemeral_id":"54f9c4d3-b89b-418e-9563-3a37a2649e9b","id":"c1a9836f-a0ae-477f-9125-47ef8fc5a674","name":"AWeb02","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-01T06:46:47.881Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"AWeb02"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"10.0.0.102","sensitivity":"normal","winlog":{"activity_id":"{b7efd1f2-42f6-4c1c-b5da-68fcdc9bb3ae}","api":"wineventlog","channel":"Security","computer_name":"AWeb02","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"nighthawk","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":996}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":2707915,"task":"Special Logon"}}
|
Product: Windows Active Directory
Vendor: Microsoft
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-01T06:46:46.972Z","agent":{"ephemeral_id":"54f9c4d3-b89b-418e-9563-3a37a2649e9b","id":"c1a9836f-a0ae-477f-9125-47ef8fc5a674","name":"AWeb02","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-01T06:46:47.881Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"AWeb02"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"10.0.0.102","sensitivity":"normal","winlog":{"activity_id":"{b7efd1f2-42f6-4c1c-b5da-68fcdc9bb3ae}","api":"wineventlog","channel":"Security","computer_name":"AWeb02","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"nighthawk","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":996}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":2707915,"task":"Special Logon"}}
|
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.0.0.102
severitylabel: Info
tags: ['v8', 'eventId:4672', 'microsoft-windows-security-auditing', 'security_privilege_change']
productids: [43]
sourceinfo: unknown
sensitivity: normal
messagetype: security_privilege_change
vendorcode: 2707915
action: Special Logon
streamName: microsoft-windows-security-auditing
userName: nighthawk
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-01T06:48:34.046Z","agent":{"ephemeral_id":"4853e543-6cb1-4d27-a0b5-92904a51b634","id":"76eb9f91-c210-4b95-9288-5a2c5f4e1a67","name":"MicroixWeb01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-01T06:48:35.965Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"MicroixWeb01"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"UMBRELLA (umbrella.umbrellacloud.com)","senderHost":"10.0.0.75","sensitivity":"normal","winlog":{"activity_id":"{3ba13ced-8a12-4020-a436-303e42e3b167}","api":"wineventlog","channel":"Security","computer_name":"MicroixWeb01","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"charlie","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":708,"thread":{"id":5692}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1186903,"task":"Special Logon"}}
|
{
"senderhost": "10.0.0.75",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4672",
"microsoft-windows-security-auditing",
"security_privilege_change"
],
"productids": [
43
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-01T06:48:34.046Z\",\"agent\":{\"ephemeral_id\":\"4853e543-6cb1-4d27-a0b5-92904a51b634\",\"id\":\"76eb9f91-c210-4b95-9288-5a2c5f4e1a67\",\"name\":\"MicroixWeb01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Special Logon\",\"code\":\"4672\",\"created\":\"2022-08-01T06:48:35.965Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"MicroixWeb01\"},\"log\":{\"level\":\"information\"},\"message\":\"Special privileges assigned to new logon.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tNT AUTHORITY\\n\\tLogon ID:\\t\\t0x3E7\\n\\nPrivileges:\\t\\tSeAssignPrimaryTokenPrivilege\\n\\t\\t\\tSeTcbPrivilege\\n\\t\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeAuditPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"organization\":\"UMBRELLA (umbrella.umbrellacloud.com)\",\"senderHost\":\"10.0.0.75\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{3ba13ced-8a12-4020-a436-303e42e3b167}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"MicroixWeb01\",\"event_data\":{\"PrivilegeList\":\"SeAssignPrimaryTokenPrivilege\\n\\t\\t\\tSeTcbPrivilege\\n\\t\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeAuditPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"SubjectDomainName\":\"NT AUTHORITY\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"charlie\",\"SubjectUserSid\":\"S-1-5-18\"},\"event_id\":\"4672\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":5692}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1186903,\"task\":\"Special Logon\"}}",
"sensitivity": "normal",
"messagetype": "security_privilege_change",
"vendorcode": "1186903",
"action": "Special Logon",
"streamName": "microsoft-windows-security-auditing",
"userName": "charlie"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-01T06:48:34.046Z","agent":{"ephemeral_id":"4853e543-6cb1-4d27-a0b5-92904a51b634","id":"76eb9f91-c210-4b95-9288-5a2c5f4e1a67","name":"MicroixWeb01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-01T06:48:35.965Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"MicroixWeb01"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"UMBRELLA (umbrella.umbrellacloud.com)","senderHost":"10.0.0.75","sensitivity":"normal","winlog":{"activity_id":"{3ba13ced-8a12-4020-a436-303e42e3b167}","api":"wineventlog","channel":"Security","computer_name":"MicroixWeb01","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"charlie","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":708,"thread":{"id":5692}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1186903,"task":"Special Logon"}}
|
Product: Windows Active Directory
Vendor: Microsoft
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-01T06:48:34.046Z","agent":{"ephemeral_id":"4853e543-6cb1-4d27-a0b5-92904a51b634","id":"76eb9f91-c210-4b95-9288-5a2c5f4e1a67","name":"MicroixWeb01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-01T06:48:35.965Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"MicroixWeb01"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"UMBRELLA (umbrella.umbrellacloud.com)","senderHost":"10.0.0.75","sensitivity":"normal","winlog":{"activity_id":"{3ba13ced-8a12-4020-a436-303e42e3b167}","api":"wineventlog","channel":"Security","computer_name":"MicroixWeb01","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"charlie","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":708,"thread":{"id":5692}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1186903,"task":"Special Logon"}}
|
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.0.0.75
severitylabel: Info
tags: ['v8', 'eventId:4672', 'microsoft-windows-security-auditing', 'security_privilege_change']
productids: [43]
sourceinfo: unknown
sensitivity: normal
messagetype: security_privilege_change
vendorcode: 1186903
action: Special Logon
streamName: microsoft-windows-security-auditing
userName: charlie
|
Explain this syslog message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=109.134.29.57 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=159.91.247.208 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.91.247.208 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 45170,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1688498912646 ",
"message": "<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=109.134.29.57 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=159.91.247.208 spt=45170 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication=\"Mozilla/5.0 zgrab/0.x\" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.91.247.208 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:66.240.236.116",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "159.91.247.208",
"serverIP": "109.134.29.57",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=109.134.29.57 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=159.91.247.208 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.91.247.208 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=109.134.29.57 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=159.91.247.208 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.91.247.208 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45170
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1688498912646
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:66.240.236.116', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 159.91.247.208
serverIP: 109.134.29.57
userName: -
|
Explain this syslog message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.181.26.7 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=187.233.142.136 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=187.233.142.136 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 45170,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1688498912646 ",
"message": "<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.181.26.7 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=187.233.142.136 spt=45170 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication=\"Mozilla/5.0 zgrab/0.x\" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=187.233.142.136 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:66.240.236.116",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "187.233.142.136",
"serverIP": "119.181.26.7",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.181.26.7 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=187.233.142.136 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=187.233.142.136 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.181.26.7 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=187.233.142.136 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=187.233.142.136 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45170
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1688498912646
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:66.240.236.116', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 187.233.142.136
serverIP: 119.181.26.7
userName: -
|
Explain this syslog message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.57.187.183 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=129.209.165.248 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=129.209.165.248 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 45170,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1688498912646 ",
"message": "<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.57.187.183 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=129.209.165.248 spt=45170 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication=\"Mozilla/5.0 zgrab/0.x\" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=129.209.165.248 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:66.240.236.116",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "129.209.165.248",
"serverIP": "189.57.187.183",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.57.187.183 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=129.209.165.248 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=129.209.165.248 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.57.187.183 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=129.209.165.248 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=129.209.165.248 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45170
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1688498912646
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:66.240.236.116', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 129.209.165.248
serverIP: 189.57.187.183
userName: -
|
Explain this syslog message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=203.116.63.116 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=121.1.30.157 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.1.30.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 45170,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1688498912646 ",
"message": "<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=203.116.63.116 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=121.1.30.157 spt=45170 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication=\"Mozilla/5.0 zgrab/0.x\" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.1.30.157 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:66.240.236.116",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "121.1.30.157",
"serverIP": "203.116.63.116",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=203.116.63.116 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=121.1.30.157 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.1.30.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=203.116.63.116 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=121.1.30.157 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.1.30.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45170
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1688498912646
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:66.240.236.116', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 121.1.30.157
serverIP: 203.116.63.116
userName: -
|
Explain this syslog message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=75.213.225.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=164.47.151.232 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=164.47.151.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 45170,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1688498912646 ",
"message": "<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=75.213.225.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=164.47.151.232 spt=45170 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication=\"Mozilla/5.0 zgrab/0.x\" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=164.47.151.232 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:66.240.236.116",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "164.47.151.232",
"serverIP": "75.213.225.46",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=75.213.225.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=164.47.151.232 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=164.47.151.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=75.213.225.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=164.47.151.232 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=164.47.151.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45170
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1688498912646
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:66.240.236.116', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 164.47.151.232
serverIP: 75.213.225.46
userName: -
|
Explain this syslog message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=244.169.29.177 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=242.89.54.100 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.89.54.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 45170,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1688498912646 ",
"message": "<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=244.169.29.177 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=242.89.54.100 spt=45170 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication=\"Mozilla/5.0 zgrab/0.x\" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.89.54.100 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:66.240.236.116",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "242.89.54.100",
"serverIP": "244.169.29.177",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=244.169.29.177 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=242.89.54.100 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.89.54.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 4 14:28:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=244.169.29.177 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=242.89.54.100 spt=45170 requestMethod=GET app=HTTP requestContext="-" start=Jul 04 2023 14:28:32 rt=1688498912646 request=/ requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1892260bd86-d2b496 cn2=45170 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.89.54.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45170
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1688498912646
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:66.240.236.116', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 242.89.54.100
serverIP: 244.169.29.177
userName: -
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=6.227.164.83 dst=201.139.118.125 protocol=tcp sport=443 dport=39754 decision=blocked
|
{
"action": "block",
"clientport": 39754,
"message": "<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=6.227.164.83 dst=201.139.118.125 protocol=tcp sport=443 dport=39754 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "201.139.118.125",
"serverIP": "6.227.164.83"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=6.227.164.83 dst=201.139.118.125 protocol=tcp sport=443 dport=39754 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=6.227.164.83 dst=201.139.118.125 protocol=tcp sport=443 dport=39754 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 39754
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 201.139.118.125
serverIP: 6.227.164.83
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=199.76.103.33 dst=76.64.93.179 protocol=tcp sport=443 dport=39754 decision=blocked
|
{
"action": "block",
"clientport": 39754,
"message": "<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=199.76.103.33 dst=76.64.93.179 protocol=tcp sport=443 dport=39754 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "76.64.93.179",
"serverIP": "199.76.103.33"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=199.76.103.33 dst=76.64.93.179 protocol=tcp sport=443 dport=39754 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=199.76.103.33 dst=76.64.93.179 protocol=tcp sport=443 dport=39754 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 39754
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 76.64.93.179
serverIP: 199.76.103.33
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=218.17.95.202 dst=57.229.153.30 protocol=tcp sport=443 dport=39754 decision=blocked
|
{
"action": "block",
"clientport": 39754,
"message": "<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=218.17.95.202 dst=57.229.153.30 protocol=tcp sport=443 dport=39754 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "57.229.153.30",
"serverIP": "218.17.95.202"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=218.17.95.202 dst=57.229.153.30 protocol=tcp sport=443 dport=39754 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=218.17.95.202 dst=57.229.153.30 protocol=tcp sport=443 dport=39754 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 39754
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 57.229.153.30
serverIP: 218.17.95.202
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=113.175.142.115 dst=154.3.245.56 protocol=tcp sport=443 dport=39754 decision=blocked
|
{
"action": "block",
"clientport": 39754,
"message": "<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=113.175.142.115 dst=154.3.245.56 protocol=tcp sport=443 dport=39754 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "154.3.245.56",
"serverIP": "113.175.142.115"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=113.175.142.115 dst=154.3.245.56 protocol=tcp sport=443 dport=39754 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688224455.655391335 NORDC_MX400_1 l7_firewall src=113.175.142.115 dst=154.3.245.56 protocol=tcp sport=443 dport=39754 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 39754
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 154.3.245.56
serverIP: 113.175.142.115
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=80.120.28.68 dst=129.20.223.239 protocol=tcp sport=51905 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 51905,
"message": "<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=80.120.28.68 dst=129.20.223.239 protocol=tcp sport=51905 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "80.120.28.68",
"serverIP": "129.20.223.239"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=80.120.28.68 dst=129.20.223.239 protocol=tcp sport=51905 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=80.120.28.68 dst=129.20.223.239 protocol=tcp sport=51905 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51905
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 80.120.28.68
serverIP: 129.20.223.239
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=94.20.77.153 dst=192.255.14.240 protocol=tcp sport=51905 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 51905,
"message": "<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=94.20.77.153 dst=192.255.14.240 protocol=tcp sport=51905 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "94.20.77.153",
"serverIP": "192.255.14.240"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=94.20.77.153 dst=192.255.14.240 protocol=tcp sport=51905 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=94.20.77.153 dst=192.255.14.240 protocol=tcp sport=51905 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51905
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 94.20.77.153
serverIP: 192.255.14.240
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=144.12.79.222 dst=243.130.192.161 protocol=tcp sport=51905 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 51905,
"message": "<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=144.12.79.222 dst=243.130.192.161 protocol=tcp sport=51905 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "144.12.79.222",
"serverIP": "243.130.192.161"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=144.12.79.222 dst=243.130.192.161 protocol=tcp sport=51905 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=144.12.79.222 dst=243.130.192.161 protocol=tcp sport=51905 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51905
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 144.12.79.222
serverIP: 243.130.192.161
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=209.38.175.218 dst=78.143.9.86 protocol=tcp sport=51905 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 51905,
"message": "<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=209.38.175.218 dst=78.143.9.86 protocol=tcp sport=51905 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "209.38.175.218",
"serverIP": "78.143.9.86"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=209.38.175.218 dst=78.143.9.86 protocol=tcp sport=51905 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688102340.086990138 NORDC_MX400_1 l7_firewall src=209.38.175.218 dst=78.143.9.86 protocol=tcp sport=51905 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51905
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 209.38.175.218
serverIP: 78.143.9.86
|
Explain this syslog message
|
<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=17.197.91.27 dst=70.109.151.211 protocol=tcp sport=56535 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 56535,
"message": "<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=17.197.91.27 dst=70.109.151.211 protocol=tcp sport=56535 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "17.197.91.27",
"serverIP": "70.109.151.211"
}
|
Create a JSON artifact from the message
|
<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=17.197.91.27 dst=70.109.151.211 protocol=tcp sport=56535 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=17.197.91.27 dst=70.109.151.211 protocol=tcp sport=56535 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56535
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 17.197.91.27
serverIP: 70.109.151.211
|
Explain this syslog message
|
<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=232.166.85.102 dst=224.132.20.66 protocol=tcp sport=56535 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 56535,
"message": "<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=232.166.85.102 dst=224.132.20.66 protocol=tcp sport=56535 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "232.166.85.102",
"serverIP": "224.132.20.66"
}
|
Create a JSON artifact from the message
|
<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=232.166.85.102 dst=224.132.20.66 protocol=tcp sport=56535 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=232.166.85.102 dst=224.132.20.66 protocol=tcp sport=56535 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56535
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 232.166.85.102
serverIP: 224.132.20.66
|
Explain this syslog message
|
<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=19.134.2.152 dst=120.139.43.191 protocol=tcp sport=56535 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 56535,
"message": "<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=19.134.2.152 dst=120.139.43.191 protocol=tcp sport=56535 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "19.134.2.152",
"serverIP": "120.139.43.191"
}
|
Create a JSON artifact from the message
|
<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=19.134.2.152 dst=120.139.43.191 protocol=tcp sport=56535 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=19.134.2.152 dst=120.139.43.191 protocol=tcp sport=56535 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56535
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 19.134.2.152
serverIP: 120.139.43.191
|
Explain this syslog message
|
<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=32.105.40.140 dst=32.189.69.80 protocol=tcp sport=56535 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 56535,
"message": "<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=32.105.40.140 dst=32.189.69.80 protocol=tcp sport=56535 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "32.105.40.140",
"serverIP": "32.189.69.80"
}
|
Create a JSON artifact from the message
|
<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=32.105.40.140 dst=32.189.69.80 protocol=tcp sport=56535 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=97.89.16.253 1 1688105899.148242238 M96_MX67C_MECLawrencevilleMain l7_firewall src=32.105.40.140 dst=32.189.69.80 protocol=tcp sport=56535 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56535
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 32.105.40.140
serverIP: 32.189.69.80
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=184.158.146.34 dst=220.117.3.14 protocol=tcp sport=80 dport=23848 decision=blocked
|
{
"action": "block",
"clientport": 23848,
"message": "<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=184.158.146.34 dst=220.117.3.14 protocol=tcp sport=80 dport=23848 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "220.117.3.14",
"serverIP": "184.158.146.34"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=184.158.146.34 dst=220.117.3.14 protocol=tcp sport=80 dport=23848 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=184.158.146.34 dst=220.117.3.14 protocol=tcp sport=80 dport=23848 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 23848
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 220.117.3.14
serverIP: 184.158.146.34
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=201.52.231.32 dst=240.113.90.102 protocol=tcp sport=80 dport=23848 decision=blocked
|
{
"action": "block",
"clientport": 23848,
"message": "<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=201.52.231.32 dst=240.113.90.102 protocol=tcp sport=80 dport=23848 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "240.113.90.102",
"serverIP": "201.52.231.32"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=201.52.231.32 dst=240.113.90.102 protocol=tcp sport=80 dport=23848 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=201.52.231.32 dst=240.113.90.102 protocol=tcp sport=80 dport=23848 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 23848
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 240.113.90.102
serverIP: 201.52.231.32
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=31.250.174.137 dst=187.248.253.80 protocol=tcp sport=80 dport=23848 decision=blocked
|
{
"action": "block",
"clientport": 23848,
"message": "<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=31.250.174.137 dst=187.248.253.80 protocol=tcp sport=80 dport=23848 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "187.248.253.80",
"serverIP": "31.250.174.137"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=31.250.174.137 dst=187.248.253.80 protocol=tcp sport=80 dport=23848 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=31.250.174.137 dst=187.248.253.80 protocol=tcp sport=80 dport=23848 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 23848
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 187.248.253.80
serverIP: 31.250.174.137
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.