input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=77.112.14.171 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=33.111.249.169 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.111.249.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=77.112.14.171 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=33.111.249.169 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.111.249.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:173.252.95.7', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1666565720730 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png clientport: 48472 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 33.111.249.169 serverIP: 77.112.14.171 userName: -
Explain this syslog message
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=178.173.184.239 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=17.216.66.88 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.216.66.88 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:173.252.95.7", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=178.173.184.239 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=17.216.66.88 spt=48472 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.216.66.88 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1666565720730 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png", "clientport": 48472, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "17.216.66.88", "serverIP": "178.173.184.239", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=178.173.184.239 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=17.216.66.88 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.216.66.88 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=178.173.184.239 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=17.216.66.88 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.216.66.88 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:173.252.95.7', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1666565720730 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png clientport: 48472 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 17.216.66.88 serverIP: 178.173.184.239 userName: -
Explain this syslog message
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.9.100.164 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=153.247.112.241 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=153.247.112.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:173.252.95.7", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.9.100.164 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=153.247.112.241 spt=48472 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=153.247.112.241 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1666565720730 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png", "clientport": 48472, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "153.247.112.241", "serverIP": "134.9.100.164", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.9.100.164 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=153.247.112.241 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=153.247.112.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.9.100.164 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=153.247.112.241 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=153.247.112.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:173.252.95.7', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1666565720730 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png clientport: 48472 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 153.247.112.241 serverIP: 134.9.100.164 userName: -
Explain this syslog message
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=102.121.245.230 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=94.179.204.33 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.179.204.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 47220, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/wp-content/plugins/wp-central/readme.txt", "localhostname": "WAFirewall", "localstarttime": "1719581300278 ", "message": "<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=102.121.245.230 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=94.179.204.33 spt=47220 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.179.204.33 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf", "ProxyIP:45.156.129.46" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "94.179.204.33", "serverIP": "102.121.245.230", "userName": "-" }
Create a JSON artifact from the message
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=102.121.245.230 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=94.179.204.33 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.179.204.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=102.121.245.230 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=94.179.204.33 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.179.204.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 47220 facilitycode: 23 facilitylabel: local7 fqdn: /wp-content/plugins/wp-central/readme.txt localhostname: WAFirewall localstarttime: 1719581300278 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf', 'ProxyIP:45.156.129.46'] vendorcode: 342 streamName: barracuda_waf clientIP: 94.179.204.33 serverIP: 102.121.245.230 userName: -
Explain this syslog message
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=233.56.218.30 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=52.117.51.76 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.117.51.76 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 47220, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/wp-content/plugins/wp-central/readme.txt", "localhostname": "WAFirewall", "localstarttime": "1719581300278 ", "message": "<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=233.56.218.30 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=52.117.51.76 spt=47220 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.117.51.76 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf", "ProxyIP:45.156.129.46" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "52.117.51.76", "serverIP": "233.56.218.30", "userName": "-" }
Create a JSON artifact from the message
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=233.56.218.30 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=52.117.51.76 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.117.51.76 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=233.56.218.30 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=52.117.51.76 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.117.51.76 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 47220 facilitycode: 23 facilitylabel: local7 fqdn: /wp-content/plugins/wp-central/readme.txt localhostname: WAFirewall localstarttime: 1719581300278 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf', 'ProxyIP:45.156.129.46'] vendorcode: 342 streamName: barracuda_waf clientIP: 52.117.51.76 serverIP: 233.56.218.30 userName: -
Explain this syslog message
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=238.236.82.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=218.171.161.160 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.171.161.160 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 47220, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/wp-content/plugins/wp-central/readme.txt", "localhostname": "WAFirewall", "localstarttime": "1719581300278 ", "message": "<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=238.236.82.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=218.171.161.160 spt=47220 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.171.161.160 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf", "ProxyIP:45.156.129.46" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "218.171.161.160", "serverIP": "238.236.82.16", "userName": "-" }
Create a JSON artifact from the message
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=238.236.82.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=218.171.161.160 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.171.161.160 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jun 28 08:28:20 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=238.236.82.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=218.171.161.160 spt=47220 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2024 08:28:20 rt=1719581300278 request=/wp-content/plugins/wp-central/readme.txt requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=1905f085636-697b5667 cn2=47220 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=218.171.161.160 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 47220 facilitycode: 23 facilitylabel: local7 fqdn: /wp-content/plugins/wp-central/readme.txt localhostname: WAFirewall localstarttime: 1719581300278 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf', 'ProxyIP:45.156.129.46'] vendorcode: 342 streamName: barracuda_waf clientIP: 218.171.161.160 serverIP: 238.236.82.16 userName: -
Explain this syslog message
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=216.92.19.95 dst=223.155.138.124 protocol=tcp sport=52171 dport=443 decision=blocked
{ "action": "block", "clientport": 52171, "message": "<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=216.92.19.95 dst=223.155.138.124 protocol=tcp sport=52171 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "216.92.19.95", "serverIP": "223.155.138.124" }
Create a JSON artifact from the message
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=216.92.19.95 dst=223.155.138.124 protocol=tcp sport=52171 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=216.92.19.95 dst=223.155.138.124 protocol=tcp sport=52171 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52171 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 216.92.19.95 serverIP: 223.155.138.124
Explain this syslog message
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=26.205.30.182 dst=200.239.132.40 protocol=tcp sport=52171 dport=443 decision=blocked
{ "action": "block", "clientport": 52171, "message": "<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=26.205.30.182 dst=200.239.132.40 protocol=tcp sport=52171 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "26.205.30.182", "serverIP": "200.239.132.40" }
Create a JSON artifact from the message
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=26.205.30.182 dst=200.239.132.40 protocol=tcp sport=52171 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=26.205.30.182 dst=200.239.132.40 protocol=tcp sport=52171 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52171 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 26.205.30.182 serverIP: 200.239.132.40
Explain this syslog message
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=9.30.43.144 dst=189.40.81.30 protocol=tcp sport=52171 dport=443 decision=blocked
{ "action": "block", "clientport": 52171, "message": "<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=9.30.43.144 dst=189.40.81.30 protocol=tcp sport=52171 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "9.30.43.144", "serverIP": "189.40.81.30" }
Create a JSON artifact from the message
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=9.30.43.144 dst=189.40.81.30 protocol=tcp sport=52171 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=9.30.43.144 dst=189.40.81.30 protocol=tcp sport=52171 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52171 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 9.30.43.144 serverIP: 189.40.81.30
Explain this syslog message
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=141.227.227.1 dst=166.183.32.117 protocol=tcp sport=52171 dport=443 decision=blocked
{ "action": "block", "clientport": 52171, "message": "<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=141.227.227.1 dst=166.183.32.117 protocol=tcp sport=52171 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "141.227.227.1", "serverIP": "166.183.32.117" }
Create a JSON artifact from the message
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=141.227.227.1 dst=166.183.32.117 protocol=tcp sport=52171 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=166.166.78.165 1 1690546096.711630663 M1113_MX67C_NewnanMMI l7_firewall src=141.227.227.1 dst=166.183.32.117 protocol=tcp sport=52171 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52171 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 141.227.227.1 serverIP: 166.183.32.117
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=152.19.185.98 dst=145.116.206.128 protocol=tcp sport=54792 dport=443 decision=blocked
{ "action": "block", "clientport": 54792, "message": "<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=152.19.185.98 dst=145.116.206.128 protocol=tcp sport=54792 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "152.19.185.98", "serverIP": "145.116.206.128" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=152.19.185.98 dst=145.116.206.128 protocol=tcp sport=54792 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=152.19.185.98 dst=145.116.206.128 protocol=tcp sport=54792 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54792 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 152.19.185.98 serverIP: 145.116.206.128
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=7.12.78.173 dst=111.165.204.14 protocol=tcp sport=54792 dport=443 decision=blocked
{ "action": "block", "clientport": 54792, "message": "<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=7.12.78.173 dst=111.165.204.14 protocol=tcp sport=54792 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "7.12.78.173", "serverIP": "111.165.204.14" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=7.12.78.173 dst=111.165.204.14 protocol=tcp sport=54792 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=7.12.78.173 dst=111.165.204.14 protocol=tcp sport=54792 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54792 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 7.12.78.173 serverIP: 111.165.204.14
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=202.176.95.199 dst=72.71.222.175 protocol=tcp sport=54792 dport=443 decision=blocked
{ "action": "block", "clientport": 54792, "message": "<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=202.176.95.199 dst=72.71.222.175 protocol=tcp sport=54792 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "202.176.95.199", "serverIP": "72.71.222.175" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=202.176.95.199 dst=72.71.222.175 protocol=tcp sport=54792 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=202.176.95.199 dst=72.71.222.175 protocol=tcp sport=54792 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54792 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 202.176.95.199 serverIP: 72.71.222.175
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=229.16.105.137 dst=138.163.53.148 protocol=tcp sport=54792 dport=443 decision=blocked
{ "action": "block", "clientport": 54792, "message": "<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=229.16.105.137 dst=138.163.53.148 protocol=tcp sport=54792 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "229.16.105.137", "serverIP": "138.163.53.148" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=229.16.105.137 dst=138.163.53.148 protocol=tcp sport=54792 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690754605.276176373 NORDC_MX400_1 l7_firewall src=229.16.105.137 dst=138.163.53.148 protocol=tcp sport=54792 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54792 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 229.16.105.137 serverIP: 138.163.53.148
Explain this syslog message
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=85.167.170.163 dst=176.195.136.215 protocol=tcp sport=53436 dport=443 decision=blocked
{ "action": "block", "clientport": 53436, "message": "<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=85.167.170.163 dst=176.195.136.215 protocol=tcp sport=53436 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "85.167.170.163", "serverIP": "176.195.136.215" }
Create a JSON artifact from the message
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=85.167.170.163 dst=176.195.136.215 protocol=tcp sport=53436 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=85.167.170.163 dst=176.195.136.215 protocol=tcp sport=53436 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 53436 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 85.167.170.163 serverIP: 176.195.136.215
Explain this syslog message
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=134.86.102.118 dst=95.150.178.163 protocol=tcp sport=53436 dport=443 decision=blocked
{ "action": "block", "clientport": 53436, "message": "<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=134.86.102.118 dst=95.150.178.163 protocol=tcp sport=53436 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "134.86.102.118", "serverIP": "95.150.178.163" }
Create a JSON artifact from the message
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=134.86.102.118 dst=95.150.178.163 protocol=tcp sport=53436 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=134.86.102.118 dst=95.150.178.163 protocol=tcp sport=53436 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 53436 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 134.86.102.118 serverIP: 95.150.178.163
Explain this syslog message
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=22.176.96.2 dst=207.46.119.202 protocol=tcp sport=53436 dport=443 decision=blocked
{ "action": "block", "clientport": 53436, "message": "<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=22.176.96.2 dst=207.46.119.202 protocol=tcp sport=53436 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "22.176.96.2", "serverIP": "207.46.119.202" }
Create a JSON artifact from the message
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=22.176.96.2 dst=207.46.119.202 protocol=tcp sport=53436 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=22.176.96.2 dst=207.46.119.202 protocol=tcp sport=53436 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 53436 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 22.176.96.2 serverIP: 207.46.119.202
Explain this syslog message
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=60.70.24.226 dst=139.216.36.151 protocol=tcp sport=53436 dport=443 decision=blocked
{ "action": "block", "clientport": 53436, "message": "<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=60.70.24.226 dst=139.216.36.151 protocol=tcp sport=53436 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "60.70.24.226", "serverIP": "139.216.36.151" }
Create a JSON artifact from the message
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=60.70.24.226 dst=139.216.36.151 protocol=tcp sport=53436 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.67.227.85 1 1690592595.798428817 M24_MX67C_ForestPark l7_firewall src=60.70.24.226 dst=139.216.36.151 protocol=tcp sport=53436 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 53436 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 60.70.24.226 serverIP: 139.216.36.151
Explain this syslog message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=236.24.71.145 dpt=80 act=DENY msg=[] duser="-" src=173.32.135.199 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.32.135.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 31825, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1720876806535 ", "message": "<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=236.24.71.145 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=173.32.135.199 spt=31825 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.32.135.199 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "ProxyIP:64.62.197.89", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "173.32.135.199", "serverIP": "236.24.71.145", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=236.24.71.145 dpt=80 act=DENY msg=[] duser="-" src=173.32.135.199 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.32.135.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=236.24.71.145 dpt=80 act=DENY msg=[] duser="-" src=173.32.135.199 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.32.135.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 31825 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1720876806535 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'ProxyIP:64.62.197.89', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 173.32.135.199 serverIP: 236.24.71.145 userName: -
Explain this syslog message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=109.26.119.229 dpt=80 act=DENY msg=[] duser="-" src=211.247.85.68 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.247.85.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 31825, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1720876806535 ", "message": "<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=109.26.119.229 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=211.247.85.68 spt=31825 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.247.85.68 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "ProxyIP:64.62.197.89", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "211.247.85.68", "serverIP": "109.26.119.229", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=109.26.119.229 dpt=80 act=DENY msg=[] duser="-" src=211.247.85.68 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.247.85.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=109.26.119.229 dpt=80 act=DENY msg=[] duser="-" src=211.247.85.68 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.247.85.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 31825 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1720876806535 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'ProxyIP:64.62.197.89', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 211.247.85.68 serverIP: 109.26.119.229 userName: -
Explain this syslog message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=179.118.73.36 dpt=80 act=DENY msg=[] duser="-" src=97.26.211.63 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=97.26.211.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 31825, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1720876806535 ", "message": "<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=179.118.73.36 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=97.26.211.63 spt=31825 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=97.26.211.63 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "ProxyIP:64.62.197.89", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "97.26.211.63", "serverIP": "179.118.73.36", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=179.118.73.36 dpt=80 act=DENY msg=[] duser="-" src=97.26.211.63 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=97.26.211.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=179.118.73.36 dpt=80 act=DENY msg=[] duser="-" src=97.26.211.63 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=97.26.211.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 31825 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1720876806535 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'ProxyIP:64.62.197.89', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 97.26.211.63 serverIP: 179.118.73.36 userName: -
Explain this syslog message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=221.77.140.92 dpt=80 act=DENY msg=[] duser="-" src=186.244.236.18 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=186.244.236.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 31825, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1720876806535 ", "message": "<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=221.77.140.92 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=186.244.236.18 spt=31825 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=186.244.236.18 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "ProxyIP:64.62.197.89", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "186.244.236.18", "serverIP": "221.77.140.92", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=221.77.140.92 dpt=80 act=DENY msg=[] duser="-" src=186.244.236.18 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=186.244.236.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=221.77.140.92 dpt=80 act=DENY msg=[] duser="-" src=186.244.236.18 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=186.244.236.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 31825 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1720876806535 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'ProxyIP:64.62.197.89', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 186.244.236.18 serverIP: 221.77.140.92 userName: -
Explain this syslog message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=203.136.198.130 dpt=80 act=DENY msg=[] duser="-" src=225.74.66.218 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=225.74.66.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 31825, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1720876806535 ", "message": "<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=203.136.198.130 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=225.74.66.218 spt=31825 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=225.74.66.218 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "ProxyIP:64.62.197.89", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "225.74.66.218", "serverIP": "203.136.198.130", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=203.136.198.130 dpt=80 act=DENY msg=[] duser="-" src=225.74.66.218 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=225.74.66.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 13 08:20:06 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=203.136.198.130 dpt=80 act=DENY msg=[] duser="-" src=225.74.66.218 spt=31825 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 08:20:06 rt=1720876806535 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac403187-dfa0fc92 cn2=31825 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=225.74.66.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 31825 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1720876806535 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'ProxyIP:64.62.197.89', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 225.74.66.218 serverIP: 203.136.198.130 userName: -
Explain this syslog message
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=79.20.21.82 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=130.60.30.16 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.60.30.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35998, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1704319509758 ", "message": "<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=79.20.21.82 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser=\"-\" src=130.60.30.16 spt=35998 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.60.30.16 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:198.199.116.114", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "130.60.30.16", "serverIP": "79.20.21.82", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=79.20.21.82 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=130.60.30.16 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.60.30.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=79.20.21.82 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=130.60.30.16 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.60.30.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35998 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1704319509758 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:198.199.116.114', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 130.60.30.16 serverIP: 79.20.21.82 userName: -
Explain this syslog message
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=229.63.57.163 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=240.42.159.105 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=240.42.159.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35998, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1704319509758 ", "message": "<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=229.63.57.163 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser=\"-\" src=240.42.159.105 spt=35998 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=240.42.159.105 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:198.199.116.114", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "240.42.159.105", "serverIP": "229.63.57.163", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=229.63.57.163 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=240.42.159.105 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=240.42.159.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=229.63.57.163 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=240.42.159.105 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=240.42.159.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35998 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1704319509758 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:198.199.116.114', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 240.42.159.105 serverIP: 229.63.57.163 userName: -
Explain this syslog message
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=62.207.33.201 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=25.102.154.241 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=25.102.154.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35998, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1704319509758 ", "message": "<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=62.207.33.201 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser=\"-\" src=25.102.154.241 spt=35998 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=25.102.154.241 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:198.199.116.114", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "25.102.154.241", "serverIP": "62.207.33.201", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=62.207.33.201 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=25.102.154.241 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=25.102.154.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 3 16:05:09 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=62.207.33.201 dpt=80 act=DENY msg=[MGLNDD_12.166.83.81_80] duser="-" src=25.102.154.241 spt=35998 requestMethod="-" app=HTTP requestContext="-" start=Jan 03 2024 16:05:09 rt=1704319509758 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18cd15be4fe-25f53329 cn2=35998 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=25.102.154.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35998 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1704319509758 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:198.199.116.114', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 25.102.154.241 serverIP: 62.207.33.201 userName: -
Explain this syslog message
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=132.244.109.26 dst=105.38.170.243 protocol=udp sport=52855 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=132.244.109.26 dst=105.38.170.243 protocol=udp sport=52855 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 52855, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "132.244.109.26", "serverIP": "105.38.170.243" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=132.244.109.26 dst=105.38.170.243 protocol=udp sport=52855 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=132.244.109.26 dst=105.38.170.243 protocol=udp sport=52855 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 52855 protocol: 17 streamName: meraki_l7_firewall clientIP: 132.244.109.26 serverIP: 105.38.170.243
Explain this syslog message
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=62.222.81.43 dst=31.113.31.83 protocol=udp sport=52855 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=62.222.81.43 dst=31.113.31.83 protocol=udp sport=52855 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 52855, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "62.222.81.43", "serverIP": "31.113.31.83" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=62.222.81.43 dst=31.113.31.83 protocol=udp sport=52855 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=62.222.81.43 dst=31.113.31.83 protocol=udp sport=52855 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 52855 protocol: 17 streamName: meraki_l7_firewall clientIP: 62.222.81.43 serverIP: 31.113.31.83
Explain this syslog message
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=93.15.143.72 dst=212.207.107.0 protocol=udp sport=52855 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=93.15.143.72 dst=212.207.107.0 protocol=udp sport=52855 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 52855, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "93.15.143.72", "serverIP": "212.207.107.0" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=93.15.143.72 dst=212.207.107.0 protocol=udp sport=52855 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=93.15.143.72 dst=212.207.107.0 protocol=udp sport=52855 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 52855 protocol: 17 streamName: meraki_l7_firewall clientIP: 93.15.143.72 serverIP: 212.207.107.0
Explain this syslog message
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=225.32.120.8 dst=253.61.231.29 protocol=udp sport=52855 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=225.32.120.8 dst=253.61.231.29 protocol=udp sport=52855 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 52855, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "225.32.120.8", "serverIP": "253.61.231.29" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=225.32.120.8 dst=253.61.231.29 protocol=udp sport=52855 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1666288897.659563434 M31_MX67C_PV_MMI l7_firewall src=225.32.120.8 dst=253.61.231.29 protocol=udp sport=52855 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 52855 protocol: 17 streamName: meraki_l7_firewall clientIP: 225.32.120.8 serverIP: 253.61.231.29
Explain this syslog message
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.211.163.91 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=86.53.144.192 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=86.53.144.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 57052, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1709912555190 ", "message": "<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.211.163.91 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=86.53.144.192 spt=57052 requestMethod=GET app=HTTP requestContext=\"-\" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=86.53.144.192 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "ProxyIP:146.19.24.28", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "86.53.144.192", "serverIP": "227.211.163.91", "userName": "-" }
Create a JSON artifact from the message
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.211.163.91 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=86.53.144.192 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=86.53.144.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.211.163.91 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=86.53.144.192 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=86.53.144.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 57052 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1709912555190 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:146.19.24.28', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 86.53.144.192 serverIP: 227.211.163.91 userName: -
Explain this syslog message
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.49.171.220 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=155.239.47.151 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.239.47.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 57052, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1709912555190 ", "message": "<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.49.171.220 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=155.239.47.151 spt=57052 requestMethod=GET app=HTTP requestContext=\"-\" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.239.47.151 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "ProxyIP:146.19.24.28", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "155.239.47.151", "serverIP": "67.49.171.220", "userName": "-" }
Create a JSON artifact from the message
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.49.171.220 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=155.239.47.151 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.239.47.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.49.171.220 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=155.239.47.151 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.239.47.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 57052 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1709912555190 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:146.19.24.28', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 155.239.47.151 serverIP: 67.49.171.220 userName: -
Explain this syslog message
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.99.85.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=144.58.106.164 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.58.106.164 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 57052, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1709912555190 ", "message": "<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.99.85.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=144.58.106.164 spt=57052 requestMethod=GET app=HTTP requestContext=\"-\" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.58.106.164 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "ProxyIP:146.19.24.28", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "144.58.106.164", "serverIP": "101.99.85.204", "userName": "-" }
Create a JSON artifact from the message
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.99.85.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=144.58.106.164 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.58.106.164 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Mar 8 09:42:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.99.85.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=144.58.106.164 spt=57052 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 09:42:35 rt=1709912555190 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1ebafeb6-a9a0490c cn2=57052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.58.106.164 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 57052 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1709912555190 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:146.19.24.28', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 144.58.106.164 serverIP: 101.99.85.204 userName: -
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=167.157.197.21 dst=216.124.136.221 protocol=tcp sport=52022 dport=443 decision=blocked
{ "action": "block", "clientport": 52022, "message": "<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=167.157.197.21 dst=216.124.136.221 protocol=tcp sport=52022 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "167.157.197.21", "serverIP": "216.124.136.221" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=167.157.197.21 dst=216.124.136.221 protocol=tcp sport=52022 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message