input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=167.157.197.21 dst=216.124.136.221 protocol=tcp sport=52022 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52022
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 167.157.197.21
serverIP: 216.124.136.221
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=246.156.9.54 dst=232.158.246.90 protocol=tcp sport=52022 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 52022,
"message": "<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=246.156.9.54 dst=232.158.246.90 protocol=tcp sport=52022 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "246.156.9.54",
"serverIP": "232.158.246.90"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=246.156.9.54 dst=232.158.246.90 protocol=tcp sport=52022 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=246.156.9.54 dst=232.158.246.90 protocol=tcp sport=52022 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52022
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 246.156.9.54
serverIP: 232.158.246.90
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=253.57.92.115 dst=116.149.251.21 protocol=tcp sport=52022 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 52022,
"message": "<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=253.57.92.115 dst=116.149.251.21 protocol=tcp sport=52022 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "253.57.92.115",
"serverIP": "116.149.251.21"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=253.57.92.115 dst=116.149.251.21 protocol=tcp sport=52022 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=253.57.92.115 dst=116.149.251.21 protocol=tcp sport=52022 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52022
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 253.57.92.115
serverIP: 116.149.251.21
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=155.211.152.139 dst=123.97.244.119 protocol=tcp sport=52022 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 52022,
"message": "<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=155.211.152.139 dst=123.97.244.119 protocol=tcp sport=52022 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "155.211.152.139",
"serverIP": "123.97.244.119"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=155.211.152.139 dst=123.97.244.119 protocol=tcp sport=52022 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1690507078.924763236 NORDC_MX400_1 l7_firewall src=155.211.152.139 dst=123.97.244.119 protocol=tcp sport=52022 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52022
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 155.211.152.139
serverIP: 123.97.244.119
|
Explain this syslog message
|
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=239.38.156.225 dst=112.134.48.120 protocol=udp sport=50021 dport=3544 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 3544,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=239.38.156.225 dst=112.134.48.120 protocol=udp sport=50021 dport=3544 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 50021,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "239.38.156.225",
"serverIP": "112.134.48.120"
}
|
Create a JSON artifact from the message
|
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=239.38.156.225 dst=112.134.48.120 protocol=udp sport=50021 dport=3544 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=239.38.156.225 dst=112.134.48.120 protocol=udp sport=50021 dport=3544 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 3544
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 50021
protocol: 17
streamName: meraki_l7_firewall
clientIP: 239.38.156.225
serverIP: 112.134.48.120
|
Explain this syslog message
|
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=208.148.179.100 dst=150.107.199.179 protocol=udp sport=50021 dport=3544 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 3544,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=208.148.179.100 dst=150.107.199.179 protocol=udp sport=50021 dport=3544 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 50021,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "208.148.179.100",
"serverIP": "150.107.199.179"
}
|
Create a JSON artifact from the message
|
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=208.148.179.100 dst=150.107.199.179 protocol=udp sport=50021 dport=3544 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=208.148.179.100 dst=150.107.199.179 protocol=udp sport=50021 dport=3544 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 3544
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 50021
protocol: 17
streamName: meraki_l7_firewall
clientIP: 208.148.179.100
serverIP: 150.107.199.179
|
Explain this syslog message
|
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=84.129.86.7 dst=231.119.46.138 protocol=udp sport=50021 dport=3544 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 3544,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=84.129.86.7 dst=231.119.46.138 protocol=udp sport=50021 dport=3544 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 50021,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "84.129.86.7",
"serverIP": "231.119.46.138"
}
|
Create a JSON artifact from the message
|
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=84.129.86.7 dst=231.119.46.138 protocol=udp sport=50021 dport=3544 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=84.129.86.7 dst=231.119.46.138 protocol=udp sport=50021 dport=3544 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 3544
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 50021
protocol: 17
streamName: meraki_l7_firewall
clientIP: 84.129.86.7
serverIP: 231.119.46.138
|
Explain this syslog message
|
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=16.61.18.238 dst=3.113.113.180 protocol=udp sport=50021 dport=3544 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 3544,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=16.61.18.238 dst=3.113.113.180 protocol=udp sport=50021 dport=3544 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 50021,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "16.61.18.238",
"serverIP": "3.113.113.180"
}
|
Create a JSON artifact from the message
|
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=16.61.18.238 dst=3.113.113.180 protocol=udp sport=50021 dport=3544 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=173.160.85.1 1 1656834214.884859990 M93_MX67C_MECCumming l7_firewall src=16.61.18.238 dst=3.113.113.180 protocol=udp sport=50021 dport=3544 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 3544
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 50021
protocol: 17
streamName: meraki_l7_firewall
clientIP: 16.61.18.238
serverIP: 3.113.113.180
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=151.148.144.138 dst=90.97.72.220 protocol=tcp sport=49884 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=151.148.144.138 dst=90.97.72.220 protocol=tcp sport=49884 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49884,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "151.148.144.138",
"serverIP": "90.97.72.220"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=151.148.144.138 dst=90.97.72.220 protocol=tcp sport=49884 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=151.148.144.138 dst=90.97.72.220 protocol=tcp sport=49884 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49884
protocol: 6
streamName: meraki_l7_firewall
clientIP: 151.148.144.138
serverIP: 90.97.72.220
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=246.26.239.231 dst=202.55.57.203 protocol=tcp sport=49884 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=246.26.239.231 dst=202.55.57.203 protocol=tcp sport=49884 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49884,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "246.26.239.231",
"serverIP": "202.55.57.203"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=246.26.239.231 dst=202.55.57.203 protocol=tcp sport=49884 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=246.26.239.231 dst=202.55.57.203 protocol=tcp sport=49884 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49884
protocol: 6
streamName: meraki_l7_firewall
clientIP: 246.26.239.231
serverIP: 202.55.57.203
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=199.99.13.120 dst=99.182.143.124 protocol=tcp sport=49884 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=199.99.13.120 dst=99.182.143.124 protocol=tcp sport=49884 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49884,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "199.99.13.120",
"serverIP": "99.182.143.124"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=199.99.13.120 dst=99.182.143.124 protocol=tcp sport=49884 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=199.99.13.120 dst=99.182.143.124 protocol=tcp sport=49884 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49884
protocol: 6
streamName: meraki_l7_firewall
clientIP: 199.99.13.120
serverIP: 99.182.143.124
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=9.183.200.228 dst=88.224.131.225 protocol=tcp sport=49884 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=9.183.200.228 dst=88.224.131.225 protocol=tcp sport=49884 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49884,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "9.183.200.228",
"serverIP": "88.224.131.225"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=9.183.200.228 dst=88.224.131.225 protocol=tcp sport=49884 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1662036690.542864203 NORDC_MX400_1 l7_firewall src=9.183.200.228 dst=88.224.131.225 protocol=tcp sport=49884 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49884
protocol: 6
streamName: meraki_l7_firewall
clientIP: 9.183.200.228
serverIP: 88.224.131.225
|
Explain this syslog message
|
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.66.211.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.125.181.232 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.125.181.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.66.211.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=78.125.181.232 spt=34764 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.125.181.232 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678186200 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 34764,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "78.125.181.232",
"serverIP": "14.66.211.124",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.66.211.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.125.181.232 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.125.181.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.66.211.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.125.181.232 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.125.181.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678186200
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 34764
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 78.125.181.232
serverIP: 14.66.211.124
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=165.20.112.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=95.147.153.255 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=95.147.153.255 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=165.20.112.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=95.147.153.255 spt=34764 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=95.147.153.255 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678186200 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 34764,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "95.147.153.255",
"serverIP": "165.20.112.49",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=165.20.112.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=95.147.153.255 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=95.147.153.255 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=165.20.112.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=95.147.153.255 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=95.147.153.255 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678186200
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 34764
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 95.147.153.255
serverIP: 165.20.112.49
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.135.67.26 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=182.188.65.187 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=182.188.65.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.135.67.26 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=182.188.65.187 spt=34764 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=182.188.65.187 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678186200 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 34764,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "182.188.65.187",
"serverIP": "3.135.67.26",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.135.67.26 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=182.188.65.187 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=182.188.65.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:06 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.135.67.26 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=182.188.65.187 spt=34764 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:06 rt=1674678186200 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9930c6-4ff229ac cn2=34764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=182.188.65.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678186200
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 34764
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 182.188.65.187
serverIP: 3.135.67.26
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=105.17.53.39 dpt=80 act=DENY msg=["-"] duser="-" src=77.167.236.162 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=77.167.236.162 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=105.17.53.39 dpt=80 act=DENY msg=[\"-\"] duser=\"-\" src=77.167.236.162 spt=33060 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=77.167.236.162 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678185290 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 33060,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "77.167.236.162",
"serverIP": "105.17.53.39",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=105.17.53.39 dpt=80 act=DENY msg=["-"] duser="-" src=77.167.236.162 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=77.167.236.162 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=105.17.53.39 dpt=80 act=DENY msg=["-"] duser="-" src=77.167.236.162 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=77.167.236.162 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678185290
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 33060
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 77.167.236.162
serverIP: 105.17.53.39
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=211.115.219.187 dpt=80 act=DENY msg=["-"] duser="-" src=64.155.141.132 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=64.155.141.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=211.115.219.187 dpt=80 act=DENY msg=[\"-\"] duser=\"-\" src=64.155.141.132 spt=33060 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=64.155.141.132 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678185290 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 33060,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "64.155.141.132",
"serverIP": "211.115.219.187",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=211.115.219.187 dpt=80 act=DENY msg=["-"] duser="-" src=64.155.141.132 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=64.155.141.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=211.115.219.187 dpt=80 act=DENY msg=["-"] duser="-" src=64.155.141.132 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=64.155.141.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678185290
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 33060
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 64.155.141.132
serverIP: 211.115.219.187
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=254.182.73.239 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=125.190.188.170 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=125.190.188.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=254.182.73.239 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=125.190.188.170 spt=38256 requestMethod=POST app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=125.190.188.170 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678188463 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 38256,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "125.190.188.170",
"serverIP": "254.182.73.239",
"userName": "alice"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=254.182.73.239 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=125.190.188.170 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=125.190.188.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=254.182.73.239 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=125.190.188.170 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=125.190.188.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678188463
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 38256
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 125.190.188.170
serverIP: 254.182.73.239
userName: alice
|
Explain this syslog message
|
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=156.144.181.31 dpt=80 act=DENY msg=["-"] duser="-" src=110.45.33.50 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=110.45.33.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=156.144.181.31 dpt=80 act=DENY msg=[\"-\"] duser=\"-\" src=110.45.33.50 spt=33060 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=110.45.33.50 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678185290 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 33060,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "110.45.33.50",
"serverIP": "156.144.181.31",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=156.144.181.31 dpt=80 act=DENY msg=["-"] duser="-" src=110.45.33.50 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=110.45.33.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:05 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=156.144.181.31 dpt=80 act=DENY msg=["-"] duser="-" src=110.45.33.50 spt=33060 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:05 rt=1674678185290 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992d4a-e01acef cn2=33060 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=110.45.33.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678185290
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 33060
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 110.45.33.50
serverIP: 156.144.181.31
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.59.8.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=8.144.27.254 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.144.27.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.59.8.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=8.144.27.254 spt=38256 requestMethod=POST app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.144.27.254 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678188463 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 38256,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "8.144.27.254",
"serverIP": "224.59.8.173",
"userName": "janedoe"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.59.8.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=8.144.27.254 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.144.27.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.59.8.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=8.144.27.254 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.144.27.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678188463
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 38256
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 8.144.27.254
serverIP: 224.59.8.173
userName: janedoe
|
Explain this syslog message
|
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=178.97.19.65 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=fish src=230.99.213.249 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.99.213.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=178.97.19.65 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=fish src=230.99.213.249 spt=38256 requestMethod=POST app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.99.213.249 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678188463 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 38256,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "230.99.213.249",
"serverIP": "178.97.19.65",
"userName": "fish"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=178.97.19.65 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=fish src=230.99.213.249 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.99.213.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:08 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=178.97.19.65 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=fish src=230.99.213.249 spt=38256 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:08 rt=1674678188463 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9939af-49f5f2cc cn2=38256 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.99.213.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678188463
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 38256
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 230.99.213.249
serverIP: 178.97.19.65
userName: fish
|
Explain this syslog message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=104.161.114.199 dpt=80 act=DENY msg=[] duser="-" src=123.249.212.86 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=123.249.212.86 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=104.161.114.199 dpt=80 act=DENY msg=[\u0016\u0003\u0001\u0002] duser=\"-\" src=123.249.212.86 spt=57316 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=123.249.212.86 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678182014 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 57316,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "123.249.212.86",
"serverIP": "104.161.114.199",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=104.161.114.199 dpt=80 act=DENY msg=[] duser="-" src=123.249.212.86 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=123.249.212.86 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=104.161.114.199 dpt=80 act=DENY msg=[] duser="-" src=123.249.212.86 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=123.249.212.86 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678182014
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 57316
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 123.249.212.86
serverIP: 104.161.114.199
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=210.42.66.158 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=248.242.131.87 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=248.242.131.87 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=210.42.66.158 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\:1\\\\,\\\\\"method\\\\\"\\\\:\\\\\"eth_submitLogin\\\\\"\\\\,\\\\\"worker\\\\\"\\\\:\\\\\"eth1.0\\\\\"\\\\,\\\\\"params\\\\\"\\\\:\\\\[\\\\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser=\"-\" src=248.242.131.87 spt=59590 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=248.242.131.87 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678184162 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 59590,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "248.242.131.87",
"serverIP": "210.42.66.158",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=210.42.66.158 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=248.242.131.87 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=248.242.131.87 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=210.42.66.158 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=248.242.131.87 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=248.242.131.87 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678184162
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 59590
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 248.242.131.87
serverIP: 210.42.66.158
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=78.115.32.171 dpt=80 act=DENY msg=[] duser="-" src=74.211.209.123 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=74.211.209.123 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=78.115.32.171 dpt=80 act=DENY msg=[\u0016\u0003\u0001\u0002] duser=\"-\" src=74.211.209.123 spt=57316 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=74.211.209.123 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678182014 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 57316,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "74.211.209.123",
"serverIP": "78.115.32.171",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=78.115.32.171 dpt=80 act=DENY msg=[] duser="-" src=74.211.209.123 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=74.211.209.123 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=78.115.32.171 dpt=80 act=DENY msg=[] duser="-" src=74.211.209.123 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=74.211.209.123 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678182014
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 57316
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 74.211.209.123
serverIP: 78.115.32.171
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=94.221.87.238 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=182.40.154.202 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=182.40.154.202 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=94.221.87.238 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\:1\\\\,\\\\\"method\\\\\"\\\\:\\\\\"eth_submitLogin\\\\\"\\\\,\\\\\"worker\\\\\"\\\\:\\\\\"eth1.0\\\\\"\\\\,\\\\\"params\\\\\"\\\\:\\\\[\\\\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser=\"-\" src=182.40.154.202 spt=59590 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=182.40.154.202 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678184162 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 59590,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "182.40.154.202",
"serverIP": "94.221.87.238",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=94.221.87.238 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=182.40.154.202 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=182.40.154.202 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=94.221.87.238 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=182.40.154.202 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=182.40.154.202 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678184162
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 59590
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 182.40.154.202
serverIP: 94.221.87.238
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=207.100.223.32 dpt=80 act=DENY msg=[] duser="-" src=144.42.85.247 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=144.42.85.247 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=207.100.223.32 dpt=80 act=DENY msg=[\u0016\u0003\u0001\u0002] duser=\"-\" src=144.42.85.247 spt=57316 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=144.42.85.247 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678182014 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 57316,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "144.42.85.247",
"serverIP": "207.100.223.32",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=207.100.223.32 dpt=80 act=DENY msg=[] duser="-" src=144.42.85.247 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=144.42.85.247 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=207.100.223.32 dpt=80 act=DENY msg=[] duser="-" src=144.42.85.247 spt=57316 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182014 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea99207e-49fcf60b cn2=57316 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=144.42.85.247 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678182014
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 57316
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 144.42.85.247
serverIP: 207.100.223.32
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=153.151.168.68 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=197.224.124.223 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=197.224.124.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=153.151.168.68 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\:1\\\\,\\\\\"method\\\\\"\\\\:\\\\\"eth_submitLogin\\\\\"\\\\,\\\\\"worker\\\\\"\\\\:\\\\\"eth1.0\\\\\"\\\\,\\\\\"params\\\\\"\\\\:\\\\[\\\\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser=\"-\" src=197.224.124.223 spt=59590 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=197.224.124.223 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678184162 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 59590,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "197.224.124.223",
"serverIP": "153.151.168.68",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=153.151.168.68 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=197.224.124.223 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=197.224.124.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:04 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=153.151.168.68 dpt=80 act=DENY msg=[{\\"id\\"\\:1\\,\\"method\\"\\:\\"eth_submitLogin\\"\\,\\"worker\\"\\:\\"eth1.0\\"\\,\\"params\\"\\:\\[\\"0xc4d9b2b0a73ed834651bb3a776ece1a5ba33] duser="-" src=197.224.124.223 spt=59590 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:04 rt=1674678184162 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9928e2-4ced147d cn2=59590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=197.224.124.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678184162
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 59590
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 197.224.124.223
serverIP: 153.151.168.68
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=49.3.242.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=213.90.35.227 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=213.90.35.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=49.3.242.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=213.90.35.227 spt=51132 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=213.90.35.227 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678199792 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/download/file.ext",
"clientport": 51132,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "213.90.35.227",
"serverIP": "49.3.242.151",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=49.3.242.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=213.90.35.227 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=213.90.35.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=49.3.242.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=213.90.35.227 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=213.90.35.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678199792
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /download/file.ext
clientport: 51132
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 213.90.35.227
serverIP: 49.3.242.151
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=245.85.184.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=167.250.77.197 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.250.77.197 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=245.85.184.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=167.250.77.197 spt=39554 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication=\"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)\" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.250.77.197 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678191162 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/WuEL",
"clientport": 39554,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "167.250.77.197",
"serverIP": "245.85.184.173",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=245.85.184.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=167.250.77.197 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.250.77.197 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=245.85.184.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=167.250.77.197 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.250.77.197 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678191162
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /WuEL
clientport: 39554
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 167.250.77.197
serverIP: 245.85.184.173
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=159.104.209.39 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=46.116.62.127 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.116.62.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=159.104.209.39 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=46.116.62.127 spt=47160 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.116.62.127 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678195184 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/a",
"clientport": 47160,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "46.116.62.127",
"serverIP": "159.104.209.39",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=159.104.209.39 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=46.116.62.127 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.116.62.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=159.104.209.39 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=46.116.62.127 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.116.62.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678195184
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /a
clientport: 47160
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 46.116.62.127
serverIP: 159.104.209.39
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=129.68.242.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=148.121.126.171 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.121.126.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=129.68.242.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=148.121.126.171 spt=51132 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.121.126.171 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678199792 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/download/file.ext",
"clientport": 51132,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "148.121.126.171",
"serverIP": "129.68.242.59",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=129.68.242.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=148.121.126.171 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.121.126.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=129.68.242.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=148.121.126.171 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.121.126.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678199792
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /download/file.ext
clientport: 51132
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 148.121.126.171
serverIP: 129.68.242.59
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.91.125.117 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=247.179.113.120 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=247.179.113.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.91.125.117 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=247.179.113.120 spt=39554 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication=\"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)\" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=247.179.113.120 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678191162 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/WuEL",
"clientport": 39554,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "247.179.113.120",
"serverIP": "155.91.125.117",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.91.125.117 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=247.179.113.120 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=247.179.113.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.91.125.117 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=247.179.113.120 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=247.179.113.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678191162
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /WuEL
clientport: 39554
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 247.179.113.120
serverIP: 155.91.125.117
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=45.91.17.5 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=196.246.44.108 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.246.44.108 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=45.91.17.5 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=196.246.44.108 spt=47160 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.246.44.108 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678195184 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/a",
"clientport": 47160,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "196.246.44.108",
"serverIP": "45.91.17.5",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=45.91.17.5 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=196.246.44.108 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.246.44.108 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=45.91.17.5 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=196.246.44.108 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.246.44.108 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678195184
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /a
clientport: 47160
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 196.246.44.108
serverIP: 45.91.17.5
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.146.33.97 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=70.199.184.223 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=70.199.184.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.146.33.97 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=70.199.184.223 spt=51132 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=70.199.184.223 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678199792 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/download/file.ext",
"clientport": 51132,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "70.199.184.223",
"serverIP": "115.146.33.97",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.146.33.97 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=70.199.184.223 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=70.199.184.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:19 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.146.33.97 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=70.199.184.223 spt=51132 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:19 rt=1674678199792 request=/download/file.ext requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9965f0-4cf50ccd cn2=51132 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=70.199.184.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678199792
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /download/file.ext
clientport: 51132
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 70.199.184.223
serverIP: 115.146.33.97
userName: -
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.