input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=35.224.174.0 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=98.226.100.23 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.226.100.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=35.224.174.0 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=98.226.100.23 spt=39554 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication=\"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)\" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.226.100.23 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678191162 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/WuEL", "clientport": 39554, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "98.226.100.23", "serverIP": "35.224.174.0", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=35.224.174.0 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=98.226.100.23 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.226.100.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=35.224.174.0 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=98.226.100.23 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.226.100.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678191162 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /WuEL clientport: 39554 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 98.226.100.23 serverIP: 35.224.174.0 userName: -
Explain this syslog message
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=232.113.250.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.10.59.136 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.10.59.136 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=232.113.250.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=204.10.59.136 spt=47160 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.10.59.136 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678195184 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/a", "clientport": 47160, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "204.10.59.136", "serverIP": "232.113.250.105", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=232.113.250.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.10.59.136 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.10.59.136 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=232.113.250.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.10.59.136 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.10.59.136 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678195184 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /a clientport: 47160 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 204.10.59.136 serverIP: 232.113.250.105 userName: -
Explain this syslog message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=198.32.50.15 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=200.73.160.70 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=200.73.160.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=198.32.50.15 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\: 1\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.subscribe\\\\\"\\\\, \\\\\"params\\\\\"\\\\: \\\\[\\\\\"cpuminer/2.5.1\\\\\"\\\\]}] duser=\"-\" src=200.73.160.70 spt=58002 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=200.73.160.70 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678182584 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 58002, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "200.73.160.70", "serverIP": "198.32.50.15", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=198.32.50.15 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=200.73.160.70 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=200.73.160.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=198.32.50.15 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=200.73.160.70 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=200.73.160.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678182584 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 58002 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 200.73.160.70 serverIP: 198.32.50.15 userName: -
Explain this syslog message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=116.247.116.134 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=132.162.166.51 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=132.162.166.51 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=116.247.116.134 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\: 1\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.subscribe\\\\\"\\\\, \\\\\"params\\\\\"\\\\: \\\\[\\\\\"cpuminer/2.5.1\\\\\"\\\\]}] duser=\"-\" src=132.162.166.51 spt=58002 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=132.162.166.51 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678182584 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 58002, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "132.162.166.51", "serverIP": "116.247.116.134", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=116.247.116.134 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=132.162.166.51 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=132.162.166.51 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=116.247.116.134 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=132.162.166.51 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=132.162.166.51 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678182584 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 58002 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 132.162.166.51 serverIP: 116.247.116.134 userName: -
Explain this syslog message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=255.244.183.175 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=173.217.160.158 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.217.160.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=255.244.183.175 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\: 1\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.subscribe\\\\\"\\\\, \\\\\"params\\\\\"\\\\: \\\\[\\\\\"cpuminer/2.5.1\\\\\"\\\\]}] duser=\"-\" src=173.217.160.158 spt=58002 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.217.160.158 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678182584 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 58002, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "173.217.160.158", "serverIP": "255.244.183.175", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=255.244.183.175 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=173.217.160.158 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.217.160.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=255.244.183.175 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=173.217.160.158 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.217.160.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678182584 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 58002 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 173.217.160.158 serverIP: 255.244.183.175 userName: -
Explain this syslog message
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=74.141.98.233 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=38.86.171.11 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=38.86.171.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=74.141.98.233 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\: 1\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.subscribe\\\\\"\\\\, \\\\\"params\\\\\"\\\\: \\\\[\\\\\"MinerName/1.0.0\\\\\"\\\\, \\\\\"EthereumStratum/1.0.0\\\\\"\\\\]}] duser=\"-\" src=38.86.171.11 spt=58922 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=38.86.171.11 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678183063 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 58922, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "38.86.171.11", "serverIP": "74.141.98.233", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=74.141.98.233 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=38.86.171.11 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=38.86.171.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=74.141.98.233 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=38.86.171.11 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=38.86.171.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678183063 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 58922 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 38.86.171.11 serverIP: 74.141.98.233 userName: -
Explain this syslog message
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=125.139.183.77 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=164.108.200.252 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=164.108.200.252 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=125.139.183.77 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\: 1\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.subscribe\\\\\"\\\\, \\\\\"params\\\\\"\\\\: \\\\[\\\\\"MinerName/1.0.0\\\\\"\\\\, \\\\\"EthereumStratum/1.0.0\\\\\"\\\\]}] duser=\"-\" src=164.108.200.252 spt=58922 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=164.108.200.252 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678183063 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 58922, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "164.108.200.252", "serverIP": "125.139.183.77", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=125.139.183.77 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=164.108.200.252 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=164.108.200.252 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=125.139.183.77 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=164.108.200.252 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=164.108.200.252 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678183063 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 58922 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 164.108.200.252 serverIP: 125.139.183.77 userName: -
Explain this syslog message
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.43.113.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=148.214.62.180 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.214.62.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.43.113.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=148.214.62.180 spt=36742 requestMethod=POST app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.214.62.180 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678187584 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 36742, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "148.214.62.180", "serverIP": "153.43.113.212", "userName": "alice" }
Create a JSON artifact from the message
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.43.113.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=148.214.62.180 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.214.62.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.43.113.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=148.214.62.180 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.214.62.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678187584 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 36742 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 148.214.62.180 serverIP: 153.43.113.212 userName: alice
Explain this syslog message
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=99.104.109.254 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=199.14.14.85 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=199.14.14.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=99.104.109.254 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\: 1\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.subscribe\\\\\"\\\\, \\\\\"params\\\\\"\\\\: \\\\[\\\\\"MinerName/1.0.0\\\\\"\\\\, \\\\\"EthereumStratum/1.0.0\\\\\"\\\\]}] duser=\"-\" src=199.14.14.85 spt=58922 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=199.14.14.85 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678183063 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 58922, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "199.14.14.85", "serverIP": "99.104.109.254", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=99.104.109.254 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=199.14.14.85 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=199.14.14.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=99.104.109.254 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=199.14.14.85 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=199.14.14.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1674678183063 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 58922 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 199.14.14.85 serverIP: 99.104.109.254 userName: -
Explain this syslog message
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=117.51.146.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=69.46.169.223 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.46.169.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=117.51.146.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=69.46.169.223 spt=36742 requestMethod=POST app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.46.169.223 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678187584 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 36742, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "69.46.169.223", "serverIP": "117.51.146.234", "userName": "janedoe" }
Create a JSON artifact from the message
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=117.51.146.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=69.46.169.223 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.46.169.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=117.51.146.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=69.46.169.223 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.46.169.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678187584 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 36742 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 69.46.169.223 serverIP: 117.51.146.234 userName: janedoe
Explain this syslog message
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=251.192.196.215 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=176.203.4.54 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.203.4.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=251.192.196.215 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=176.203.4.54 spt=36742 requestMethod=POST app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.203.4.54 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678187584 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 36742, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "176.203.4.54", "serverIP": "251.192.196.215", "userName": "nighthawk" }
Create a JSON artifact from the message
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=251.192.196.215 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=176.203.4.54 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.203.4.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=251.192.196.215 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=176.203.4.54 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.203.4.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678187584 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 36742 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 176.203.4.54 serverIP: 251.192.196.215 userName: nighthawk
Explain this syslog message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=37.237.69.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.46.11.249 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.46.11.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=37.237.69.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=141.46.11.249 spt=44338 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.46.11.249 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678191824 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/stager64", "clientport": 44338, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "141.46.11.249", "serverIP": "37.237.69.146", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=37.237.69.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.46.11.249 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.46.11.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=37.237.69.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.46.11.249 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.46.11.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678191824 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /stager64 clientport: 44338 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 141.46.11.249 serverIP: 37.237.69.146 userName: -
Explain this syslog message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=69.97.146.255 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.163.106.39 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.163.106.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=69.97.146.255 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=93.163.106.39 spt=44338 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.163.106.39 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678191824 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/stager64", "clientport": 44338, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "93.163.106.39", "serverIP": "69.97.146.255", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=69.97.146.255 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.163.106.39 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.163.106.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=69.97.146.255 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.163.106.39 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.163.106.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678191824 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /stager64 clientport: 44338 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 93.163.106.39 serverIP: 69.97.146.255 userName: -
Explain this syslog message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=54.70.23.42 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=134.114.71.168 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=134.114.71.168 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=54.70.23.42 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=134.114.71.168 spt=44338 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=134.114.71.168 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678191824 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/stager64", "clientport": 44338, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "134.114.71.168", "serverIP": "54.70.23.42", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=54.70.23.42 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=134.114.71.168 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=134.114.71.168 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=54.70.23.42 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=134.114.71.168 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=134.114.71.168 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678191824 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /stager64 clientport: 44338 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 134.114.71.168 serverIP: 54.70.23.42 userName: -
Explain this syslog message
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=128.171.26.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.196.61.181 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.196.61.181 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=128.171.26.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=78.196.61.181 spt=56436 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.196.61.181 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678201866 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/SiteLoader", "clientport": 56436, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "78.196.61.181", "serverIP": "128.171.26.59", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=128.171.26.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.196.61.181 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.196.61.181 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=128.171.26.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.196.61.181 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.196.61.181 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678201866 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /SiteLoader clientport: 56436 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 78.196.61.181 serverIP: 128.171.26.59 userName: -
Explain this syslog message
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.238.245.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=250.128.114.183 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=250.128.114.183 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.238.245.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=250.128.114.183 spt=60734 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=250.128.114.183 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678203816 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/mPlayer", "clientport": 60734, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "250.128.114.183", "serverIP": "34.238.245.89", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.238.245.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=250.128.114.183 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=250.128.114.183 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.238.245.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=250.128.114.183 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=250.128.114.183 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678203816 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /mPlayer clientport: 60734 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 250.128.114.183 serverIP: 34.238.245.89 userName: -
Explain this syslog message
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=145.13.89.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.109.105.80 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.109.105.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=145.13.89.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=40.109.105.80 spt=56436 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.109.105.80 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678201866 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/SiteLoader", "clientport": 56436, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "40.109.105.80", "serverIP": "145.13.89.105", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=145.13.89.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.109.105.80 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.109.105.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=145.13.89.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.109.105.80 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.109.105.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678201866 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /SiteLoader clientport: 56436 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 40.109.105.80 serverIP: 145.13.89.105 userName: -
Explain this syslog message
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=110.225.180.44 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.135.46.103 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.135.46.103 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=110.225.180.44 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=254.135.46.103 spt=60734 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.135.46.103 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678203816 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/mPlayer", "clientport": 60734, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "254.135.46.103", "serverIP": "110.225.180.44", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=110.225.180.44 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.135.46.103 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.135.46.103 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=110.225.180.44 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.135.46.103 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.135.46.103 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678203816 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /mPlayer clientport: 60734 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 254.135.46.103 serverIP: 110.225.180.44 userName: -
Explain this syslog message
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=118.198.189.113 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=126.74.186.66 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.74.186.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=118.198.189.113 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=126.74.186.66 spt=56436 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.74.186.66 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678201866 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/SiteLoader", "clientport": 56436, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "126.74.186.66", "serverIP": "118.198.189.113", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=118.198.189.113 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=126.74.186.66 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.74.186.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=118.198.189.113 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=126.74.186.66 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.74.186.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678201866 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /SiteLoader clientport: 56436 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 126.74.186.66 serverIP: 118.198.189.113 userName: -
Explain this syslog message
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.221.213.195 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.145.226.84 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.145.226.84 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.213.174.115", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.221.213.195 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=118.145.226.84 spt=60734 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.145.226.84 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1674678203816 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/mPlayer", "clientport": 60734, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "118.145.226.84", "serverIP": "153.221.213.195", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.221.213.195 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.145.226.84 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.145.226.84 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.221.213.195 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.145.226.84 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.145.226.84 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1674678203816 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /mPlayer clientport: 60734 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 118.145.226.84 serverIP: 153.221.213.195 userName: -
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=124.213.28.81 dst=156.42.71.50 protocol=tcp sport=59883 dport=443 decision=blocked
{ "action": "block", "clientport": 59883, "message": "<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=124.213.28.81 dst=156.42.71.50 protocol=tcp sport=59883 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "124.213.28.81", "serverIP": "156.42.71.50" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=124.213.28.81 dst=156.42.71.50 protocol=tcp sport=59883 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=124.213.28.81 dst=156.42.71.50 protocol=tcp sport=59883 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59883 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 124.213.28.81 serverIP: 156.42.71.50
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=182.108.212.129 dst=196.100.224.69 protocol=tcp sport=59883 dport=443 decision=blocked
{ "action": "block", "clientport": 59883, "message": "<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=182.108.212.129 dst=196.100.224.69 protocol=tcp sport=59883 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "182.108.212.129", "serverIP": "196.100.224.69" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=182.108.212.129 dst=196.100.224.69 protocol=tcp sport=59883 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=182.108.212.129 dst=196.100.224.69 protocol=tcp sport=59883 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59883 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 182.108.212.129 serverIP: 196.100.224.69
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=31.149.16.215 dst=96.233.208.134 protocol=tcp sport=59883 dport=443 decision=blocked
{ "action": "block", "clientport": 59883, "message": "<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=31.149.16.215 dst=96.233.208.134 protocol=tcp sport=59883 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "31.149.16.215", "serverIP": "96.233.208.134" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=31.149.16.215 dst=96.233.208.134 protocol=tcp sport=59883 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=31.149.16.215 dst=96.233.208.134 protocol=tcp sport=59883 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59883 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 31.149.16.215 serverIP: 96.233.208.134
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=79.27.56.203 dst=248.206.129.255 protocol=tcp sport=59883 dport=443 decision=blocked
{ "action": "block", "clientport": 59883, "message": "<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=79.27.56.203 dst=248.206.129.255 protocol=tcp sport=59883 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "79.27.56.203", "serverIP": "248.206.129.255" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=79.27.56.203 dst=248.206.129.255 protocol=tcp sport=59883 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=79.27.56.203 dst=248.206.129.255 protocol=tcp sport=59883 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59883 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 79.27.56.203 serverIP: 248.206.129.255
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=13.100.53.210 dst=15.118.96.38 protocol=tcp sport=57876 dport=443 decision=blocked
{ "action": "block", "clientport": 57876, "message": "<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=13.100.53.210 dst=15.118.96.38 protocol=tcp sport=57876 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "13.100.53.210", "serverIP": "15.118.96.38" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=13.100.53.210 dst=15.118.96.38 protocol=tcp sport=57876 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=13.100.53.210 dst=15.118.96.38 protocol=tcp sport=57876 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57876 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 13.100.53.210 serverIP: 15.118.96.38
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=90.197.116.26 dst=207.60.243.183 protocol=tcp sport=57876 dport=443 decision=blocked
{ "action": "block", "clientport": 57876, "message": "<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=90.197.116.26 dst=207.60.243.183 protocol=tcp sport=57876 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "90.197.116.26", "serverIP": "207.60.243.183" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=90.197.116.26 dst=207.60.243.183 protocol=tcp sport=57876 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=90.197.116.26 dst=207.60.243.183 protocol=tcp sport=57876 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57876 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 90.197.116.26 serverIP: 207.60.243.183
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=168.78.174.217 dst=154.15.60.197 protocol=tcp sport=57876 dport=443 decision=blocked
{ "action": "block", "clientport": 57876, "message": "<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=168.78.174.217 dst=154.15.60.197 protocol=tcp sport=57876 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "168.78.174.217", "serverIP": "154.15.60.197" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=168.78.174.217 dst=154.15.60.197 protocol=tcp sport=57876 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=168.78.174.217 dst=154.15.60.197 protocol=tcp sport=57876 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57876 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 168.78.174.217 serverIP: 154.15.60.197
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=138.163.50.193 dst=178.160.178.47 protocol=tcp sport=57876 dport=443 decision=blocked
{ "action": "block", "clientport": 57876, "message": "<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=138.163.50.193 dst=178.160.178.47 protocol=tcp sport=57876 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "138.163.50.193", "serverIP": "178.160.178.47" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=138.163.50.193 dst=178.160.178.47 protocol=tcp sport=57876 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=138.163.50.193 dst=178.160.178.47 protocol=tcp sport=57876 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57876 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 138.163.50.193 serverIP: 178.160.178.47
Explain this syslog message
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=109.105.223.15 dst=206.213.35.168 protocol=tcp sport=65195 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=109.105.223.15 dst=206.213.35.168 protocol=tcp sport=65195 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 65195, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "109.105.223.15", "serverIP": "206.213.35.168" }
Create a JSON artifact from the message
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=109.105.223.15 dst=206.213.35.168 protocol=tcp sport=65195 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=109.105.223.15 dst=206.213.35.168 protocol=tcp sport=65195 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 65195 protocol: 6 streamName: meraki_l7_firewall clientIP: 109.105.223.15 serverIP: 206.213.35.168
Explain this syslog message
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=77.156.131.34 dst=98.162.36.2 protocol=tcp sport=65195 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=77.156.131.34 dst=98.162.36.2 protocol=tcp sport=65195 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 65195, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "77.156.131.34", "serverIP": "98.162.36.2" }
Create a JSON artifact from the message
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=77.156.131.34 dst=98.162.36.2 protocol=tcp sport=65195 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=77.156.131.34 dst=98.162.36.2 protocol=tcp sport=65195 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 65195 protocol: 6 streamName: meraki_l7_firewall clientIP: 77.156.131.34 serverIP: 98.162.36.2
Explain this syslog message
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=190.181.227.191 dst=90.48.217.96 protocol=tcp sport=65195 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=190.181.227.191 dst=90.48.217.96 protocol=tcp sport=65195 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 65195, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "190.181.227.191", "serverIP": "90.48.217.96" }
Create a JSON artifact from the message
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=190.181.227.191 dst=90.48.217.96 protocol=tcp sport=65195 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=190.181.227.191 dst=90.48.217.96 protocol=tcp sport=65195 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 65195 protocol: 6 streamName: meraki_l7_firewall clientIP: 190.181.227.191 serverIP: 90.48.217.96
Explain this syslog message
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=24.19.222.10 dst=76.36.79.30 protocol=tcp sport=65195 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=24.19.222.10 dst=76.36.79.30 protocol=tcp sport=65195 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 65195, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "24.19.222.10", "serverIP": "76.36.79.30" }
Create a JSON artifact from the message
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=24.19.222.10 dst=76.36.79.30 protocol=tcp sport=65195 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=24.19.222.10 dst=76.36.79.30 protocol=tcp sport=65195 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 65195 protocol: 6 streamName: meraki_l7_firewall clientIP: 24.19.222.10 serverIP: 76.36.79.30
Explain this syslog message
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=128.57.81.156 dst=126.90.57.12 protocol=tcp sport=51359 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=128.57.81.156 dst=126.90.57.12 protocol=tcp sport=51359 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 51359, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "128.57.81.156", "serverIP": "126.90.57.12" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=128.57.81.156 dst=126.90.57.12 protocol=tcp sport=51359 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=128.57.81.156 dst=126.90.57.12 protocol=tcp sport=51359 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 51359 protocol: 6 streamName: meraki_l7_firewall clientIP: 128.57.81.156 serverIP: 126.90.57.12
Explain this syslog message
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=242.135.46.252 dst=18.211.209.120 protocol=tcp sport=51359 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=242.135.46.252 dst=18.211.209.120 protocol=tcp sport=51359 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 51359, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "242.135.46.252", "serverIP": "18.211.209.120" }
Create a JSON artifact from the message