input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=77.112.14.171 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=33.111.249.169 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.111.249.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=77.112.14.171 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=33.111.249.169 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.111.249.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:173.252.95.7', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1666565720730
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png
clientport: 48472
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 33.111.249.169
serverIP: 77.112.14.171
userName: -
|
Explain this syslog message
|
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=178.173.184.239 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=17.216.66.88 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.216.66.88 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:173.252.95.7",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=178.173.184.239 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=17.216.66.88 spt=48472 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.216.66.88 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1666565720730 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png",
"clientport": 48472,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "17.216.66.88",
"serverIP": "178.173.184.239",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=178.173.184.239 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=17.216.66.88 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.216.66.88 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=178.173.184.239 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=17.216.66.88 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.216.66.88 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:173.252.95.7', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1666565720730
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png
clientport: 48472
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 17.216.66.88
serverIP: 178.173.184.239
userName: -
|
Explain this syslog message
|
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.9.100.164 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=153.247.112.241 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=153.247.112.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:173.252.95.7",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.9.100.164 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=153.247.112.241 spt=48472 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=153.247.112.241 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1666565720730 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png",
"clientport": 48472,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "153.247.112.241",
"serverIP": "134.9.100.164",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.9.100.164 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=153.247.112.241 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=153.247.112.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.9.100.164 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=153.247.112.241 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=153.247.112.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:173.252.95.7', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1666565720730
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png
clientport: 48472
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 153.247.112.241
serverIP: 134.9.100.164
userName: -
|
Explain this syslog message
|
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=102.121.245.230 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=94.179.204.33 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.179.204.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 47220,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/wp-content/plugins/wp-central/readme.txt",
"localhostname": "WAFirewall",
"localstarttime": "1719581300278 ",
"message": "<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=102.121.245.230 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=94.179.204.33 spt=47220 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.179.204.33 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf",
"ProxyIP:45.156.129.46"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "94.179.204.33",
"serverIP": "102.121.245.230",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=102.121.245.230 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=94.179.204.33 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.179.204.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=102.121.245.230 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=94.179.204.33 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.179.204.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47220
facilitycode: 23
facilitylabel: local7
fqdn: /wp-content/plugins/wp-central/readme.txt
localhostname: WAFirewall
localstarttime: 1719581300278
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf', 'ProxyIP:45.156.129.46']
vendorcode: 342
streamName: barracuda_waf
clientIP: 94.179.204.33
serverIP: 102.121.245.230
userName: -
|
Explain this syslog message
|
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=233.56.218.30 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=52.117.51.76 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.117.51.76 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 47220,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/wp-content/plugins/wp-central/readme.txt",
"localhostname": "WAFirewall",
"localstarttime": "1719581300278 ",
"message": "<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=233.56.218.30 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=52.117.51.76 spt=47220 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.117.51.76 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf",
"ProxyIP:45.156.129.46"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "52.117.51.76",
"serverIP": "233.56.218.30",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=233.56.218.30 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=52.117.51.76 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.117.51.76 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=233.56.218.30 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=52.117.51.76 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.117.51.76 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47220
facilitycode: 23
facilitylabel: local7
fqdn: /wp-content/plugins/wp-central/readme.txt
localhostname: WAFirewall
localstarttime: 1719581300278
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf', 'ProxyIP:45.156.129.46']
vendorcode: 342
streamName: barracuda_waf
clientIP: 52.117.51.76
serverIP: 233.56.218.30
userName: -
|
Explain this syslog message
|
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=238.236.82.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=218.171.161.160 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.171.161.160 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 47220,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/wp-content/plugins/wp-central/readme.txt",
"localhostname": "WAFirewall",
"localstarttime": "1719581300278 ",
"message": "<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=238.236.82.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=218.171.161.160 spt=47220 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.171.161.160 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf",
"ProxyIP:45.156.129.46"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "218.171.161.160",
"serverIP": "238.236.82.16",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=238.236.82.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=218.171.161.160 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.171.161.160 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=238.236.82.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=218.171.161.160 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.171.161.160 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47220
facilitycode: 23
facilitylabel: local7
fqdn: /wp-content/plugins/wp-central/readme.txt
localhostname: WAFirewall
localstarttime: 1719581300278
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf', 'ProxyIP:45.156.129.46']
vendorcode: 342
streamName: barracuda_waf
clientIP: 218.171.161.160
serverIP: 238.236.82.16
userName: -
|
Explain this syslog message
|
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=216.92.19.95 dst=223.155.138.124 protocol=tcp sport=52171 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 52171,
"message": "<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=216.92.19.95 dst=223.155.138.124 protocol=tcp sport=52171 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "216.92.19.95",
"serverIP": "223.155.138.124"
}
|
Create a JSON artifact from the message
|
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=216.92.19.95 dst=223.155.138.124 protocol=tcp sport=52171 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=216.92.19.95 dst=223.155.138.124 protocol=tcp sport=52171 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52171
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 216.92.19.95
serverIP: 223.155.138.124
|
Explain this syslog message
|
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=26.205.30.182 dst=200.239.132.40 protocol=tcp sport=52171 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 52171,
"message": "<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=26.205.30.182 dst=200.239.132.40 protocol=tcp sport=52171 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "26.205.30.182",
"serverIP": "200.239.132.40"
}
|
Create a JSON artifact from the message
|
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=26.205.30.182 dst=200.239.132.40 protocol=tcp sport=52171 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=26.205.30.182 dst=200.239.132.40 protocol=tcp sport=52171 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52171
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 26.205.30.182
serverIP: 200.239.132.40
|
Explain this syslog message
|
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=9.30.43.144 dst=189.40.81.30 protocol=tcp sport=52171 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 52171,
"message": "<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=9.30.43.144 dst=189.40.81.30 protocol=tcp sport=52171 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "9.30.43.144",
"serverIP": "189.40.81.30"
}
|
Create a JSON artifact from the message
|
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=9.30.43.144 dst=189.40.81.30 protocol=tcp sport=52171 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=9.30.43.144 dst=189.40.81.30 protocol=tcp sport=52171 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52171
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 9.30.43.144
serverIP: 189.40.81.30
|
Explain this syslog message
|
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=141.227.227.1 dst=166.183.32.117 protocol=tcp sport=52171 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 52171,
"message": "<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=141.227.227.1 dst=166.183.32.117 protocol=tcp sport=52171 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "141.227.227.1",
"serverIP": "166.183.32.117"
}
|
Create a JSON artifact from the message
|
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=141.227.227.1 dst=166.183.32.117 protocol=tcp sport=52171 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=141.227.227.1 dst=166.183.32.117 protocol=tcp sport=52171 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52171
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 141.227.227.1
serverIP: 166.183.32.117
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=152.19.185.98 dst=145.116.206.128 protocol=tcp sport=54792 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 54792,
"message": "<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=152.19.185.98 dst=145.116.206.128 protocol=tcp sport=54792 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "152.19.185.98",
"serverIP": "145.116.206.128"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=152.19.185.98 dst=145.116.206.128 protocol=tcp sport=54792 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=152.19.185.98 dst=145.116.206.128 protocol=tcp sport=54792 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54792
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 152.19.185.98
serverIP: 145.116.206.128
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=7.12.78.173 dst=111.165.204.14 protocol=tcp sport=54792 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 54792,
"message": "<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=7.12.78.173 dst=111.165.204.14 protocol=tcp sport=54792 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "7.12.78.173",
"serverIP": "111.165.204.14"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=7.12.78.173 dst=111.165.204.14 protocol=tcp sport=54792 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=7.12.78.173 dst=111.165.204.14 protocol=tcp sport=54792 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54792
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 7.12.78.173
serverIP: 111.165.204.14
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=202.176.95.199 dst=72.71.222.175 protocol=tcp sport=54792 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 54792,
"message": "<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=202.176.95.199 dst=72.71.222.175 protocol=tcp sport=54792 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "202.176.95.199",
"serverIP": "72.71.222.175"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=202.176.95.199 dst=72.71.222.175 protocol=tcp sport=54792 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=202.176.95.199 dst=72.71.222.175 protocol=tcp sport=54792 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54792
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 202.176.95.199
serverIP: 72.71.222.175
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=229.16.105.137 dst=138.163.53.148 protocol=tcp sport=54792 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 54792,
"message": "<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=229.16.105.137 dst=138.163.53.148 protocol=tcp sport=54792 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "229.16.105.137",
"serverIP": "138.163.53.148"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=229.16.105.137 dst=138.163.53.148 protocol=tcp sport=54792 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=229.16.105.137 dst=138.163.53.148 protocol=tcp sport=54792 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54792
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 229.16.105.137
serverIP: 138.163.53.148
|
Explain this syslog message
|
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=85.167.170.163 dst=176.195.136.215 protocol=tcp sport=53436 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 53436,
"message": "<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=85.167.170.163 dst=176.195.136.215 protocol=tcp sport=53436 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "85.167.170.163",
"serverIP": "176.195.136.215"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=85.167.170.163 dst=176.195.136.215 protocol=tcp sport=53436 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=85.167.170.163 dst=176.195.136.215 protocol=tcp sport=53436 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53436
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 85.167.170.163
serverIP: 176.195.136.215
|
Explain this syslog message
|
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=134.86.102.118 dst=95.150.178.163 protocol=tcp sport=53436 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 53436,
"message": "<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=134.86.102.118 dst=95.150.178.163 protocol=tcp sport=53436 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "134.86.102.118",
"serverIP": "95.150.178.163"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=134.86.102.118 dst=95.150.178.163 protocol=tcp sport=53436 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=134.86.102.118 dst=95.150.178.163 protocol=tcp sport=53436 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53436
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 134.86.102.118
serverIP: 95.150.178.163
|
Explain this syslog message
|
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=22.176.96.2 dst=207.46.119.202 protocol=tcp sport=53436 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 53436,
"message": "<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=22.176.96.2 dst=207.46.119.202 protocol=tcp sport=53436 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "22.176.96.2",
"serverIP": "207.46.119.202"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=22.176.96.2 dst=207.46.119.202 protocol=tcp sport=53436 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=22.176.96.2 dst=207.46.119.202 protocol=tcp sport=53436 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53436
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 22.176.96.2
serverIP: 207.46.119.202
|
Explain this syslog message
|
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=60.70.24.226 dst=139.216.36.151 protocol=tcp sport=53436 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 53436,
"message": "<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=60.70.24.226 dst=139.216.36.151 protocol=tcp sport=53436 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "60.70.24.226",
"serverIP": "139.216.36.151"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=60.70.24.226 dst=139.216.36.151 protocol=tcp sport=53436 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=60.70.24.226 dst=139.216.36.151 protocol=tcp sport=53436 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53436
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 60.70.24.226
serverIP: 139.216.36.151
|
Explain this syslog message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=236.24.71.145 dpt=80 act=DENY msg=[] duser="-" src=173.32.135.199 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.32.135.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 31825,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1720876806535 ",
"message": "<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=236.24.71.145 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=173.32.135.199 spt=31825 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.32.135.199 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"ProxyIP:64.62.197.89",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "173.32.135.199",
"serverIP": "236.24.71.145",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=236.24.71.145 dpt=80 act=DENY msg=[] duser="-" src=173.32.135.199 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.32.135.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=236.24.71.145 dpt=80 act=DENY msg=[] duser="-" src=173.32.135.199 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.32.135.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 31825
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1720876806535
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'ProxyIP:64.62.197.89', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 173.32.135.199
serverIP: 236.24.71.145
userName: -
|
Explain this syslog message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=109.26.119.229 dpt=80 act=DENY msg=[] duser="-" src=211.247.85.68 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.247.85.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 31825,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1720876806535 ",
"message": "<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=109.26.119.229 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=211.247.85.68 spt=31825 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.247.85.68 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"ProxyIP:64.62.197.89",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "211.247.85.68",
"serverIP": "109.26.119.229",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=109.26.119.229 dpt=80 act=DENY msg=[] duser="-" src=211.247.85.68 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.247.85.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=109.26.119.229 dpt=80 act=DENY msg=[] duser="-" src=211.247.85.68 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.247.85.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 31825
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1720876806535
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'ProxyIP:64.62.197.89', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 211.247.85.68
serverIP: 109.26.119.229
userName: -
|
Explain this syslog message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=179.118.73.36 dpt=80 act=DENY msg=[] duser="-" src=97.26.211.63 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=97.26.211.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 31825,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1720876806535 ",
"message": "<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=179.118.73.36 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=97.26.211.63 spt=31825 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=97.26.211.63 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"ProxyIP:64.62.197.89",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "97.26.211.63",
"serverIP": "179.118.73.36",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=179.118.73.36 dpt=80 act=DENY msg=[] duser="-" src=97.26.211.63 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=97.26.211.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=179.118.73.36 dpt=80 act=DENY msg=[] duser="-" src=97.26.211.63 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=97.26.211.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 31825
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1720876806535
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'ProxyIP:64.62.197.89', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 97.26.211.63
serverIP: 179.118.73.36
userName: -
|
Explain this syslog message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=221.77.140.92 dpt=80 act=DENY msg=[] duser="-" src=186.244.236.18 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=186.244.236.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 31825,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1720876806535 ",
"message": "<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=221.77.140.92 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=186.244.236.18 spt=31825 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=186.244.236.18 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"ProxyIP:64.62.197.89",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "186.244.236.18",
"serverIP": "221.77.140.92",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=221.77.140.92 dpt=80 act=DENY msg=[] duser="-" src=186.244.236.18 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=186.244.236.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=221.77.140.92 dpt=80 act=DENY msg=[] duser="-" src=186.244.236.18 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=186.244.236.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 31825
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1720876806535
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'ProxyIP:64.62.197.89', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 186.244.236.18
serverIP: 221.77.140.92
userName: -
|
Explain this syslog message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=203.136.198.130 dpt=80 act=DENY msg=[] duser="-" src=225.74.66.218 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=225.74.66.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 31825,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1720876806535 ",
"message": "<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=203.136.198.130 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=225.74.66.218 spt=31825 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=225.74.66.218 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"ProxyIP:64.62.197.89",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "225.74.66.218",
"serverIP": "203.136.198.130",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=203.136.198.130 dpt=80 act=DENY msg=[] duser="-" src=225.74.66.218 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=225.74.66.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=203.136.198.130 dpt=80 act=DENY msg=[] duser="-" src=225.74.66.218 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=225.74.66.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 31825
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1720876806535
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'ProxyIP:64.62.197.89', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 225.74.66.218
serverIP: 203.136.198.130
userName: -
|
Explain this syslog message
|
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=79.20.21.82 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=130.60.30.16 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.60.30.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 35998,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1704319509758 ",
"message": "<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=79.20.21.82 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser=\"-\" src=130.60.30.16 spt=35998 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.60.30.16 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:198.199.116.114",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "130.60.30.16",
"serverIP": "79.20.21.82",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=79.20.21.82 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=130.60.30.16 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.60.30.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=79.20.21.82 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=130.60.30.16 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.60.30.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35998
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1704319509758
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:198.199.116.114', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 130.60.30.16
serverIP: 79.20.21.82
userName: -
|
Explain this syslog message
|
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=229.63.57.163 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=240.42.159.105 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=240.42.159.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 35998,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1704319509758 ",
"message": "<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=229.63.57.163 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser=\"-\" src=240.42.159.105 spt=35998 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=240.42.159.105 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:198.199.116.114",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "240.42.159.105",
"serverIP": "229.63.57.163",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=229.63.57.163 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=240.42.159.105 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=240.42.159.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=229.63.57.163 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=240.42.159.105 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=240.42.159.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35998
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1704319509758
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:198.199.116.114', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 240.42.159.105
serverIP: 229.63.57.163
userName: -
|
Explain this syslog message
|
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=62.207.33.201 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=25.102.154.241 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=25.102.154.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 35998,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1704319509758 ",
"message": "<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=62.207.33.201 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser=\"-\" src=25.102.154.241 spt=35998 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=25.102.154.241 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:198.199.116.114",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "25.102.154.241",
"serverIP": "62.207.33.201",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=62.207.33.201 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=25.102.154.241 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=25.102.154.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=62.207.33.201 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=25.102.154.241 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=25.102.154.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35998
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1704319509758
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:198.199.116.114', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 25.102.154.241
serverIP: 62.207.33.201
userName: -
|
Explain this syslog message
|
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=132.244.109.26 dst=105.38.170.243 protocol=udp sport=52855 dport=53 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=132.244.109.26 dst=105.38.170.243 protocol=udp sport=52855 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52855,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "132.244.109.26",
"serverIP": "105.38.170.243"
}
|
Create a JSON artifact from the message
|
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=132.244.109.26 dst=105.38.170.243 protocol=udp sport=52855 dport=53 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=132.244.109.26 dst=105.38.170.243 protocol=udp sport=52855 dport=53 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52855
protocol: 17
streamName: meraki_l7_firewall
clientIP: 132.244.109.26
serverIP: 105.38.170.243
|
Explain this syslog message
|
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=62.222.81.43 dst=31.113.31.83 protocol=udp sport=52855 dport=53 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=62.222.81.43 dst=31.113.31.83 protocol=udp sport=52855 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52855,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "62.222.81.43",
"serverIP": "31.113.31.83"
}
|
Create a JSON artifact from the message
|
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=62.222.81.43 dst=31.113.31.83 protocol=udp sport=52855 dport=53 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=62.222.81.43 dst=31.113.31.83 protocol=udp sport=52855 dport=53 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52855
protocol: 17
streamName: meraki_l7_firewall
clientIP: 62.222.81.43
serverIP: 31.113.31.83
|
Explain this syslog message
|
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=93.15.143.72 dst=212.207.107.0 protocol=udp sport=52855 dport=53 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=93.15.143.72 dst=212.207.107.0 protocol=udp sport=52855 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52855,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "93.15.143.72",
"serverIP": "212.207.107.0"
}
|
Create a JSON artifact from the message
|
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=93.15.143.72 dst=212.207.107.0 protocol=udp sport=52855 dport=53 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=93.15.143.72 dst=212.207.107.0 protocol=udp sport=52855 dport=53 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52855
protocol: 17
streamName: meraki_l7_firewall
clientIP: 93.15.143.72
serverIP: 212.207.107.0
|
Explain this syslog message
|
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=225.32.120.8 dst=253.61.231.29 protocol=udp sport=52855 dport=53 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=225.32.120.8 dst=253.61.231.29 protocol=udp sport=52855 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52855,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "225.32.120.8",
"serverIP": "253.61.231.29"
}
|
Create a JSON artifact from the message
|
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=225.32.120.8 dst=253.61.231.29 protocol=udp sport=52855 dport=53 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=225.32.120.8 dst=253.61.231.29 protocol=udp sport=52855 dport=53 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52855
protocol: 17
streamName: meraki_l7_firewall
clientIP: 225.32.120.8
serverIP: 253.61.231.29
|
Explain this syslog message
|
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.211.163.91 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=86.53.144.192 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=86.53.144.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 57052,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1709912555190 ",
"message": "<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.211.163.91 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=86.53.144.192 spt=57052 requestMethod=GET app=HTTP requestContext=\"-\" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=86.53.144.192 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:146.19.24.28",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "86.53.144.192",
"serverIP": "227.211.163.91",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.211.163.91 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=86.53.144.192 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=86.53.144.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.211.163.91 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=86.53.144.192 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=86.53.144.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 57052
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1709912555190
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:146.19.24.28', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 86.53.144.192
serverIP: 227.211.163.91
userName: -
|
Explain this syslog message
|
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.49.171.220 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=155.239.47.151 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.239.47.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 57052,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1709912555190 ",
"message": "<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.49.171.220 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=155.239.47.151 spt=57052 requestMethod=GET app=HTTP requestContext=\"-\" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.239.47.151 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:146.19.24.28",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "155.239.47.151",
"serverIP": "67.49.171.220",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.49.171.220 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=155.239.47.151 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.239.47.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.49.171.220 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=155.239.47.151 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.239.47.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 57052
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1709912555190
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:146.19.24.28', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 155.239.47.151
serverIP: 67.49.171.220
userName: -
|
Explain this syslog message
|
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.99.85.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=144.58.106.164 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.58.106.164 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 57052,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1709912555190 ",
"message": "<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.99.85.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=144.58.106.164 spt=57052 requestMethod=GET app=HTTP requestContext=\"-\" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.58.106.164 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:146.19.24.28",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "144.58.106.164",
"serverIP": "101.99.85.204",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.99.85.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=144.58.106.164 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.58.106.164 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.99.85.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=144.58.106.164 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.58.106.164 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 57052
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1709912555190
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:146.19.24.28', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 144.58.106.164
serverIP: 101.99.85.204
userName: -
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=167.157.197.21 dst=216.124.136.221 protocol=tcp sport=52022 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 52022,
"message": "<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=167.157.197.21 dst=216.124.136.221 protocol=tcp sport=52022 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "167.157.197.21",
"serverIP": "216.124.136.221"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=167.157.197.21 dst=216.124.136.221 protocol=tcp sport=52022 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.