input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=167.157.197.21 dst=216.124.136.221 protocol=tcp sport=52022 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52022 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 167.157.197.21 serverIP: 216.124.136.221
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=246.156.9.54 dst=232.158.246.90 protocol=tcp sport=52022 dport=443 decision=blocked
{ "action": "block", "clientport": 52022, "message": "<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=246.156.9.54 dst=232.158.246.90 protocol=tcp sport=52022 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "246.156.9.54", "serverIP": "232.158.246.90" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=246.156.9.54 dst=232.158.246.90 protocol=tcp sport=52022 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=246.156.9.54 dst=232.158.246.90 protocol=tcp sport=52022 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52022 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 246.156.9.54 serverIP: 232.158.246.90
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=253.57.92.115 dst=116.149.251.21 protocol=tcp sport=52022 dport=443 decision=blocked
{ "action": "block", "clientport": 52022, "message": "<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=253.57.92.115 dst=116.149.251.21 protocol=tcp sport=52022 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "253.57.92.115", "serverIP": "116.149.251.21" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=253.57.92.115 dst=116.149.251.21 protocol=tcp sport=52022 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=253.57.92.115 dst=116.149.251.21 protocol=tcp sport=52022 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52022 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 253.57.92.115 serverIP: 116.149.251.21
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=155.211.152.139 dst=123.97.244.119 protocol=tcp sport=52022 dport=443 decision=blocked
{ "action": "block", "clientport": 52022, "message": "<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=155.211.152.139 dst=123.97.244.119 protocol=tcp sport=52022 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "155.211.152.139", "serverIP": "123.97.244.119" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=155.211.152.139 dst=123.97.244.119 protocol=tcp sport=52022 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=155.211.152.139 dst=123.97.244.119 protocol=tcp sport=52022 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52022 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 155.211.152.139 serverIP: 123.97.244.119
Explain this syslog message
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=239.38.156.225 dst=112.134.48.120 protocol=udp sport=50021 dport=3544 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 3544, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=239.38.156.225 dst=112.134.48.120 protocol=udp sport=50021 dport=3544 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 50021, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "239.38.156.225", "serverIP": "112.134.48.120" }
Create a JSON artifact from the message
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=239.38.156.225 dst=112.134.48.120 protocol=udp sport=50021 dport=3544 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=239.38.156.225 dst=112.134.48.120 protocol=udp sport=50021 dport=3544 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 3544 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 50021 protocol: 17 streamName: meraki_l7_firewall clientIP: 239.38.156.225 serverIP: 112.134.48.120
Explain this syslog message
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=208.148.179.100 dst=150.107.199.179 protocol=udp sport=50021 dport=3544 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 3544, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=208.148.179.100 dst=150.107.199.179 protocol=udp sport=50021 dport=3544 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 50021, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "208.148.179.100", "serverIP": "150.107.199.179" }
Create a JSON artifact from the message
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=208.148.179.100 dst=150.107.199.179 protocol=udp sport=50021 dport=3544 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=208.148.179.100 dst=150.107.199.179 protocol=udp sport=50021 dport=3544 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 3544 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 50021 protocol: 17 streamName: meraki_l7_firewall clientIP: 208.148.179.100 serverIP: 150.107.199.179
Explain this syslog message
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=84.129.86.7 dst=231.119.46.138 protocol=udp sport=50021 dport=3544 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 3544, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=84.129.86.7 dst=231.119.46.138 protocol=udp sport=50021 dport=3544 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 50021, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "84.129.86.7", "serverIP": "231.119.46.138" }
Create a JSON artifact from the message
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=84.129.86.7 dst=231.119.46.138 protocol=udp sport=50021 dport=3544 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=84.129.86.7 dst=231.119.46.138 protocol=udp sport=50021 dport=3544 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 3544 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 50021 protocol: 17 streamName: meraki_l7_firewall clientIP: 84.129.86.7 serverIP: 231.119.46.138
Explain this syslog message
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=16.61.18.238 dst=3.113.113.180 protocol=udp sport=50021 dport=3544 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 3544, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=16.61.18.238 dst=3.113.113.180 protocol=udp sport=50021 dport=3544 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 50021, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "16.61.18.238", "serverIP": "3.113.113.180" }
Create a JSON artifact from the message
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=16.61.18.238 dst=3.113.113.180 protocol=udp sport=50021 dport=3544 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=16.61.18.238 dst=3.113.113.180 protocol=udp sport=50021 dport=3544 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 3544 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 50021 protocol: 17 streamName: meraki_l7_firewall clientIP: 16.61.18.238 serverIP: 3.113.113.180
Explain this syslog message
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=151.148.144.138 dst=90.97.72.220 protocol=tcp sport=49884 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=151.148.144.138 dst=90.97.72.220 protocol=tcp sport=49884 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 49884, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "151.148.144.138", "serverIP": "90.97.72.220" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=151.148.144.138 dst=90.97.72.220 protocol=tcp sport=49884 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=151.148.144.138 dst=90.97.72.220 protocol=tcp sport=49884 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 49884 protocol: 6 streamName: meraki_l7_firewall clientIP: 151.148.144.138 serverIP: 90.97.72.220
Explain this syslog message
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=246.26.239.231 dst=202.55.57.203 protocol=tcp sport=49884 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=246.26.239.231 dst=202.55.57.203 protocol=tcp sport=49884 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 49884, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "246.26.239.231", "serverIP": "202.55.57.203" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=246.26.239.231 dst=202.55.57.203 protocol=tcp sport=49884 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=246.26.239.231 dst=202.55.57.203 protocol=tcp sport=49884 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 49884 protocol: 6 streamName: meraki_l7_firewall clientIP: 246.26.239.231 serverIP: 202.55.57.203
Explain this syslog message
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=199.99.13.120 dst=99.182.143.124 protocol=tcp sport=49884 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=199.99.13.120 dst=99.182.143.124 protocol=tcp sport=49884 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 49884, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "199.99.13.120", "serverIP": "99.182.143.124" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=199.99.13.120 dst=99.182.143.124 protocol=tcp sport=49884 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=199.99.13.120 dst=99.182.143.124 protocol=tcp sport=49884 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 49884 protocol: 6 streamName: meraki_l7_firewall clientIP: 199.99.13.120 serverIP: 99.182.143.124
Explain this syslog message
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=9.183.200.228 dst=88.224.131.225 protocol=tcp sport=49884 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=9.183.200.228 dst=88.224.131.225 protocol=tcp sport=49884 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 49884, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "9.183.200.228", "serverIP": "88.224.131.225" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=9.183.200.228 dst=88.224.131.225 protocol=tcp sport=49884 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=9.183.200.228 dst=88.224.131.225 protocol=tcp sport=49884 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 49884 protocol: 6 streamName: meraki_l7_firewall clientIP: 9.183.200.228 serverIP: 88.224.131.225
Explain this syslog message
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.66.211.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.125.181.232 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.125.181.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.66.211.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=78.125.181.232 spt=34764 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.125.181.232 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678186200 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 34764, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "78.125.181.232", "serverIP": "14.66.211.124", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.66.211.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.125.181.232 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.125.181.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.66.211.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.125.181.232 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.125.181.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678186200 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 34764 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 78.125.181.232 serverIP: 14.66.211.124 userName: -
Explain this syslog message
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=165.20.112.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=95.147.153.255 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=95.147.153.255 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=165.20.112.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=95.147.153.255 spt=34764 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=95.147.153.255 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678186200 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 34764, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "95.147.153.255", "serverIP": "165.20.112.49", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=165.20.112.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=95.147.153.255 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=95.147.153.255 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=165.20.112.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=95.147.153.255 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=95.147.153.255 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678186200 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 34764 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 95.147.153.255 serverIP: 165.20.112.49 userName: -
Explain this syslog message
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.135.67.26 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=182.188.65.187 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=182.188.65.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.135.67.26 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=182.188.65.187 spt=34764 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=182.188.65.187 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678186200 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 34764, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "182.188.65.187", "serverIP": "3.135.67.26", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.135.67.26 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=182.188.65.187 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=182.188.65.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.135.67.26 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=182.188.65.187 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=182.188.65.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678186200 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 34764 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 182.188.65.187 serverIP: 3.135.67.26 userName: -
Explain this syslog message
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=105.17.53.39 dpt=80 act=DENY msg=["-"] duser="-" src=77.167.236.162 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=77.167.236.162 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=105.17.53.39 dpt=80 act=DENY msg=[\"-\"] duser=\"-\" src=77.167.236.162 spt=33060 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=77.167.236.162 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678185290 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 33060, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "77.167.236.162", "serverIP": "105.17.53.39", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=105.17.53.39 dpt=80 act=DENY msg=["-"] duser="-" src=77.167.236.162 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=77.167.236.162 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=105.17.53.39 dpt=80 act=DENY msg=["-"] duser="-" src=77.167.236.162 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=77.167.236.162 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678185290 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 33060 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 77.167.236.162 serverIP: 105.17.53.39 userName: -
Explain this syslog message
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=211.115.219.187 dpt=80 act=DENY msg=["-"] duser="-" src=64.155.141.132 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=64.155.141.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=211.115.219.187 dpt=80 act=DENY msg=[\"-\"] duser=\"-\" src=64.155.141.132 spt=33060 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=64.155.141.132 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678185290 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 33060, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "64.155.141.132", "serverIP": "211.115.219.187", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=211.115.219.187 dpt=80 act=DENY msg=["-"] duser="-" src=64.155.141.132 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=64.155.141.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=211.115.219.187 dpt=80 act=DENY msg=["-"] duser="-" src=64.155.141.132 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=64.155.141.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678185290 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 33060 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 64.155.141.132 serverIP: 211.115.219.187 userName: -
Explain this syslog message
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=254.182.73.239 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=125.190.188.170 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=125.190.188.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=254.182.73.239 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=125.190.188.170 spt=38256 requestMethod=POST app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=125.190.188.170 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678188463 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 38256, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "125.190.188.170", "serverIP": "254.182.73.239", "userName": "alice" }
Create a JSON artifact from the message
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=254.182.73.239 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=125.190.188.170 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=125.190.188.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=254.182.73.239 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=125.190.188.170 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=125.190.188.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678188463 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 38256 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 125.190.188.170 serverIP: 254.182.73.239 userName: alice
Explain this syslog message
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=156.144.181.31 dpt=80 act=DENY msg=["-"] duser="-" src=110.45.33.50 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=110.45.33.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=156.144.181.31 dpt=80 act=DENY msg=[\"-\"] duser=\"-\" src=110.45.33.50 spt=33060 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=110.45.33.50 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678185290 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 33060, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "110.45.33.50", "serverIP": "156.144.181.31", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=156.144.181.31 dpt=80 act=DENY msg=["-"] duser="-" src=110.45.33.50 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=110.45.33.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=156.144.181.31 dpt=80 act=DENY msg=["-"] duser="-" src=110.45.33.50 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=110.45.33.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678185290 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 33060 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 110.45.33.50 serverIP: 156.144.181.31 userName: -
Explain this syslog message
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.59.8.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=8.144.27.254 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.144.27.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.59.8.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=8.144.27.254 spt=38256 requestMethod=POST app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.144.27.254 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678188463 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 38256, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "8.144.27.254", "serverIP": "224.59.8.173", "userName": "janedoe" }
Create a JSON artifact from the message
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.59.8.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=8.144.27.254 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.144.27.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.59.8.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=8.144.27.254 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.144.27.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678188463 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 38256 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 8.144.27.254 serverIP: 224.59.8.173 userName: janedoe
Explain this syslog message
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=178.97.19.65 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=fish src=230.99.213.249 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.99.213.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=178.97.19.65 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=fish src=230.99.213.249 spt=38256 requestMethod=POST app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.99.213.249 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678188463 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 38256, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "230.99.213.249", "serverIP": "178.97.19.65", "userName": "fish" }
Create a JSON artifact from the message
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=178.97.19.65 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=fish src=230.99.213.249 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.99.213.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=178.97.19.65 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=fish src=230.99.213.249 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.99.213.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678188463 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 38256 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 230.99.213.249 serverIP: 178.97.19.65 userName: fish
Explain this syslog message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=104.161.114.199 dpt=80 act=DENY msg=[] duser="-" src=123.249.212.86 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=123.249.212.86 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=104.161.114.199 dpt=80 act=DENY msg=[\u0016\u0003\u0001\u0002] duser=\"-\" src=123.249.212.86 spt=57316 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=123.249.212.86 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678182014 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 57316, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "123.249.212.86", "serverIP": "104.161.114.199", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=104.161.114.199 dpt=80 act=DENY msg=[] duser="-" src=123.249.212.86 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=123.249.212.86 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=104.161.114.199 dpt=80 act=DENY msg=[] duser="-" src=123.249.212.86 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=123.249.212.86 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678182014 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 57316 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 123.249.212.86 serverIP: 104.161.114.199 userName: -
Explain this syslog message
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=210.42.66.158 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=248.242.131.87 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=248.242.131.87 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=210.42.66.158 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\:1\\\\,\\\\\"method\\\\\"\\\\:\\\\\"eth_submitLogin\\\\\"\\\\,\\\\\"worker\\\\\"\\\\:\\\\\"eth1.0\\\\\"\\\\,\\\\\"params\\\\\"\\\\:\\\\[\\\\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser=\"-\" src=248.242.131.87 spt=59590 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=248.242.131.87 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678184162 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 59590, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "248.242.131.87", "serverIP": "210.42.66.158", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=210.42.66.158 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=248.242.131.87 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=248.242.131.87 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=210.42.66.158 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=248.242.131.87 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=248.242.131.87 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678184162 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 59590 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 248.242.131.87 serverIP: 210.42.66.158 userName: -
Explain this syslog message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=78.115.32.171 dpt=80 act=DENY msg=[] duser="-" src=74.211.209.123 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=74.211.209.123 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=78.115.32.171 dpt=80 act=DENY msg=[\u0016\u0003\u0001\u0002] duser=\"-\" src=74.211.209.123 spt=57316 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=74.211.209.123 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678182014 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 57316, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "74.211.209.123", "serverIP": "78.115.32.171", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=78.115.32.171 dpt=80 act=DENY msg=[] duser="-" src=74.211.209.123 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=74.211.209.123 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=78.115.32.171 dpt=80 act=DENY msg=[] duser="-" src=74.211.209.123 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=74.211.209.123 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678182014 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 57316 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 74.211.209.123 serverIP: 78.115.32.171 userName: -
Explain this syslog message
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=94.221.87.238 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=182.40.154.202 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=182.40.154.202 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=94.221.87.238 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\:1\\\\,\\\\\"method\\\\\"\\\\:\\\\\"eth_submitLogin\\\\\"\\\\,\\\\\"worker\\\\\"\\\\:\\\\\"eth1.0\\\\\"\\\\,\\\\\"params\\\\\"\\\\:\\\\[\\\\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser=\"-\" src=182.40.154.202 spt=59590 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=182.40.154.202 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678184162 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 59590, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "182.40.154.202", "serverIP": "94.221.87.238", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=94.221.87.238 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=182.40.154.202 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=182.40.154.202 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=94.221.87.238 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=182.40.154.202 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=182.40.154.202 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678184162 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 59590 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 182.40.154.202 serverIP: 94.221.87.238 userName: -
Explain this syslog message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=207.100.223.32 dpt=80 act=DENY msg=[] duser="-" src=144.42.85.247 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=144.42.85.247 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=207.100.223.32 dpt=80 act=DENY msg=[\u0016\u0003\u0001\u0002] duser=\"-\" src=144.42.85.247 spt=57316 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=144.42.85.247 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678182014 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 57316, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "144.42.85.247", "serverIP": "207.100.223.32", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=207.100.223.32 dpt=80 act=DENY msg=[] duser="-" src=144.42.85.247 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=144.42.85.247 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=207.100.223.32 dpt=80 act=DENY msg=[] duser="-" src=144.42.85.247 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=144.42.85.247 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678182014 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 57316 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 144.42.85.247 serverIP: 207.100.223.32 userName: -
Explain this syslog message
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=153.151.168.68 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=197.224.124.223 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=197.224.124.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=153.151.168.68 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\:1\\\\,\\\\\"method\\\\\"\\\\:\\\\\"eth_submitLogin\\\\\"\\\\,\\\\\"worker\\\\\"\\\\:\\\\\"eth1.0\\\\\"\\\\,\\\\\"params\\\\\"\\\\:\\\\[\\\\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser=\"-\" src=197.224.124.223 spt=59590 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=197.224.124.223 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678184162 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 59590, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "197.224.124.223", "serverIP": "153.151.168.68", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=153.151.168.68 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=197.224.124.223 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=197.224.124.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=153.151.168.68 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=197.224.124.223 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=197.224.124.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678184162 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 59590 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 197.224.124.223 serverIP: 153.151.168.68 userName: -
Explain this syslog message
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=49.3.242.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=213.90.35.227 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=213.90.35.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=49.3.242.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=213.90.35.227 spt=51132 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=213.90.35.227 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678199792 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/download/file.ext", "clientport": 51132, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "213.90.35.227", "serverIP": "49.3.242.151", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=49.3.242.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=213.90.35.227 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=213.90.35.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=49.3.242.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=213.90.35.227 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=213.90.35.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678199792 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /download/file.ext clientport: 51132 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 213.90.35.227 serverIP: 49.3.242.151 userName: -
Explain this syslog message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=245.85.184.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=167.250.77.197 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.250.77.197 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=245.85.184.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=167.250.77.197 spt=39554 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication=\"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)\" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.250.77.197 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678191162 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/WuEL", "clientport": 39554, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "167.250.77.197", "serverIP": "245.85.184.173", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=245.85.184.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=167.250.77.197 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.250.77.197 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=245.85.184.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=167.250.77.197 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.250.77.197 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678191162 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /WuEL clientport: 39554 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 167.250.77.197 serverIP: 245.85.184.173 userName: -
Explain this syslog message
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=159.104.209.39 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=46.116.62.127 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.116.62.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=159.104.209.39 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=46.116.62.127 spt=47160 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.116.62.127 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678195184 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/a", "clientport": 47160, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "46.116.62.127", "serverIP": "159.104.209.39", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=159.104.209.39 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=46.116.62.127 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.116.62.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=159.104.209.39 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=46.116.62.127 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.116.62.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678195184 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /a clientport: 47160 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 46.116.62.127 serverIP: 159.104.209.39 userName: -
Explain this syslog message
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=129.68.242.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=148.121.126.171 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.121.126.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=129.68.242.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=148.121.126.171 spt=51132 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.121.126.171 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678199792 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/download/file.ext", "clientport": 51132, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "148.121.126.171", "serverIP": "129.68.242.59", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=129.68.242.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=148.121.126.171 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.121.126.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=129.68.242.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=148.121.126.171 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.121.126.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678199792 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /download/file.ext clientport: 51132 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 148.121.126.171 serverIP: 129.68.242.59 userName: -
Explain this syslog message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.91.125.117 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=247.179.113.120 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=247.179.113.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.91.125.117 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=247.179.113.120 spt=39554 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication=\"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)\" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=247.179.113.120 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678191162 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/WuEL", "clientport": 39554, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "247.179.113.120", "serverIP": "155.91.125.117", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.91.125.117 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=247.179.113.120 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=247.179.113.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.91.125.117 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=247.179.113.120 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=247.179.113.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678191162 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /WuEL clientport: 39554 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 247.179.113.120 serverIP: 155.91.125.117 userName: -
Explain this syslog message
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=45.91.17.5 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=196.246.44.108 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.246.44.108 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=45.91.17.5 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=196.246.44.108 spt=47160 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.246.44.108 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678195184 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/a", "clientport": 47160, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "196.246.44.108", "serverIP": "45.91.17.5", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=45.91.17.5 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=196.246.44.108 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.246.44.108 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=45.91.17.5 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=196.246.44.108 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.246.44.108 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678195184 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /a clientport: 47160 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 196.246.44.108 serverIP: 45.91.17.5 userName: -
Explain this syslog message
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.146.33.97 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=70.199.184.223 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=70.199.184.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.146.33.97 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=70.199.184.223 spt=51132 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=70.199.184.223 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678199792 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/download/file.ext", "clientport": 51132, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "70.199.184.223", "serverIP": "115.146.33.97", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.146.33.97 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=70.199.184.223 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=70.199.184.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.146.33.97 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=70.199.184.223 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=70.199.184.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678199792 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /download/file.ext clientport: 51132 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 70.199.184.223 serverIP: 115.146.33.97 userName: -
Explain this syslog message