input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=35.224.174.0 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=98.226.100.23 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.226.100.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=35.224.174.0 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=98.226.100.23 spt=39554 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication=\"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)\" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.226.100.23 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678191162 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/WuEL",
"clientport": 39554,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "98.226.100.23",
"serverIP": "35.224.174.0",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=35.224.174.0 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=98.226.100.23 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.226.100.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=35.224.174.0 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=98.226.100.23 spt=39554 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191162 request=/WuEL requestClientApplication="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; ; NCLIENT50_AAPCDA5841E333)" dvchost=WAFirewall externalId=185ea994439-49f1f0a3 cn2=39554 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=98.226.100.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678191162
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /WuEL
clientport: 39554
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 98.226.100.23
serverIP: 35.224.174.0
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=232.113.250.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.10.59.136 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.10.59.136 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=232.113.250.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=204.10.59.136 spt=47160 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.10.59.136 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678195184 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/a",
"clientport": 47160,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "204.10.59.136",
"serverIP": "232.113.250.105",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=232.113.250.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.10.59.136 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.10.59.136 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:15 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=232.113.250.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.10.59.136 spt=47160 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:15 rt=1674678195184 request=/a requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9953f0-44f1c0a4 cn2=47160 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.10.59.136 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678195184
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /a
clientport: 47160
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 204.10.59.136
serverIP: 232.113.250.105
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=198.32.50.15 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=200.73.160.70 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=200.73.160.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=198.32.50.15 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\: 1\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.subscribe\\\\\"\\\\, \\\\\"params\\\\\"\\\\: \\\\[\\\\\"cpuminer/2.5.1\\\\\"\\\\]}] duser=\"-\" src=200.73.160.70 spt=58002 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=200.73.160.70 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678182584 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 58002,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "200.73.160.70",
"serverIP": "198.32.50.15",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=198.32.50.15 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=200.73.160.70 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=200.73.160.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=198.32.50.15 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=200.73.160.70 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=200.73.160.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678182584
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 58002
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 200.73.160.70
serverIP: 198.32.50.15
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=116.247.116.134 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=132.162.166.51 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=132.162.166.51 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=116.247.116.134 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\: 1\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.subscribe\\\\\"\\\\, \\\\\"params\\\\\"\\\\: \\\\[\\\\\"cpuminer/2.5.1\\\\\"\\\\]}] duser=\"-\" src=132.162.166.51 spt=58002 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=132.162.166.51 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678182584 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 58002,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "132.162.166.51",
"serverIP": "116.247.116.134",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=116.247.116.134 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=132.162.166.51 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=132.162.166.51 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=116.247.116.134 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=132.162.166.51 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=132.162.166.51 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678182584
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 58002
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 132.162.166.51
serverIP: 116.247.116.134
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=255.244.183.175 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=173.217.160.158 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.217.160.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=255.244.183.175 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\: 1\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.subscribe\\\\\"\\\\, \\\\\"params\\\\\"\\\\: \\\\[\\\\\"cpuminer/2.5.1\\\\\"\\\\]}] duser=\"-\" src=173.217.160.158 spt=58002 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.217.160.158 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678182584 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 58002,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "173.217.160.158",
"serverIP": "255.244.183.175",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=255.244.183.175 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=173.217.160.158 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.217.160.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:02 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=255.244.183.175 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"cpuminer/2.5.1\\"\\]}] duser="-" src=173.217.160.158 spt=58002 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:02 rt=1674678182584 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea9922b8-49f2f2b0 cn2=58002 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=173.217.160.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678182584
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 58002
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 173.217.160.158
serverIP: 255.244.183.175
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=74.141.98.233 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=38.86.171.11 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=38.86.171.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=74.141.98.233 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\: 1\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.subscribe\\\\\"\\\\, \\\\\"params\\\\\"\\\\: \\\\[\\\\\"MinerName/1.0.0\\\\\"\\\\, \\\\\"EthereumStratum/1.0.0\\\\\"\\\\]}] duser=\"-\" src=38.86.171.11 spt=58922 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=38.86.171.11 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678183063 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 58922,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "38.86.171.11",
"serverIP": "74.141.98.233",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=74.141.98.233 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=38.86.171.11 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=38.86.171.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=74.141.98.233 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=38.86.171.11 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=38.86.171.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678183063
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 58922
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 38.86.171.11
serverIP: 74.141.98.233
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=125.139.183.77 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=164.108.200.252 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=164.108.200.252 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=125.139.183.77 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\: 1\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.subscribe\\\\\"\\\\, \\\\\"params\\\\\"\\\\: \\\\[\\\\\"MinerName/1.0.0\\\\\"\\\\, \\\\\"EthereumStratum/1.0.0\\\\\"\\\\]}] duser=\"-\" src=164.108.200.252 spt=58922 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=164.108.200.252 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678183063 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 58922,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "164.108.200.252",
"serverIP": "125.139.183.77",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=125.139.183.77 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=164.108.200.252 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=164.108.200.252 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=125.139.183.77 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=164.108.200.252 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=164.108.200.252 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678183063
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 58922
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 164.108.200.252
serverIP: 125.139.183.77
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.43.113.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=148.214.62.180 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.214.62.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.43.113.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=148.214.62.180 spt=36742 requestMethod=POST app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.214.62.180 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678187584 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 36742,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "148.214.62.180",
"serverIP": "153.43.113.212",
"userName": "alice"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.43.113.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=148.214.62.180 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.214.62.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.43.113.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=alice src=148.214.62.180 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=148.214.62.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678187584
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 36742
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 148.214.62.180
serverIP: 153.43.113.212
userName: alice
|
Explain this syslog message
|
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=99.104.109.254 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=199.14.14.85 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=199.14.14.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=99.104.109.254 dpt=80 act=DENY msg=[{\\\\\"id\\\\\"\\\\: 1\\\\, \\\\\"method\\\\\"\\\\: \\\\\"mining.subscribe\\\\\"\\\\, \\\\\"params\\\\\"\\\\: \\\\[\\\\\"MinerName/1.0.0\\\\\"\\\\, \\\\\"EthereumStratum/1.0.0\\\\\"\\\\]}] duser=\"-\" src=199.14.14.85 spt=58922 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=199.14.14.85 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678183063 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 58922,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "199.14.14.85",
"serverIP": "99.104.109.254",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=99.104.109.254 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=199.14.14.85 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=199.14.14.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:03 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=99.104.109.254 dpt=80 act=DENY msg=[{\\"id\\"\\: 1\\, \\"method\\"\\: \\"mining.subscribe\\"\\, \\"params\\"\\: \\[\\"MinerName/1.0.0\\"\\, \\"EthereumStratum/1.0.0\\"\\]}] duser="-" src=199.14.14.85 spt=58922 requestMethod="-" app=HTTP requestContext="-" start=Jan 25 2023 14:23:03 rt=1674678183063 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185ea992497-4af3fab2 cn2=58922 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=199.14.14.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678183063
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 58922
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 199.14.14.85
serverIP: 99.104.109.254
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=117.51.146.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=69.46.169.223 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.46.169.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=117.51.146.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=69.46.169.223 spt=36742 requestMethod=POST app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.46.169.223 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678187584 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 36742,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "69.46.169.223",
"serverIP": "117.51.146.234",
"userName": "janedoe"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=117.51.146.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=69.46.169.223 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.46.169.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=117.51.146.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=janedoe src=69.46.169.223 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.46.169.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678187584
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 36742
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 69.46.169.223
serverIP: 117.51.146.234
userName: janedoe
|
Explain this syslog message
|
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=251.192.196.215 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=176.203.4.54 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.203.4.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=251.192.196.215 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=176.203.4.54 spt=36742 requestMethod=POST app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.203.4.54 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678187584 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 36742,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "176.203.4.54",
"serverIP": "251.192.196.215",
"userName": "nighthawk"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=251.192.196.215 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=176.203.4.54 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.203.4.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=251.192.196.215 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=nighthawk src=176.203.4.54 spt=36742 requestMethod=POST app=HTTP requestContext="-" start=Jan 25 2023 14:23:07 rt=1674678187584 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea99363f-76c65570 cn2=36742 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.203.4.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678187584
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 36742
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 176.203.4.54
serverIP: 251.192.196.215
userName: nighthawk
|
Explain this syslog message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=37.237.69.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.46.11.249 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.46.11.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=37.237.69.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=141.46.11.249 spt=44338 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.46.11.249 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678191824 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/stager64",
"clientport": 44338,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "141.46.11.249",
"serverIP": "37.237.69.146",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=37.237.69.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.46.11.249 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.46.11.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=37.237.69.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.46.11.249 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.46.11.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678191824
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /stager64
clientport: 44338
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 141.46.11.249
serverIP: 37.237.69.146
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=69.97.146.255 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.163.106.39 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.163.106.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=69.97.146.255 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=93.163.106.39 spt=44338 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.163.106.39 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678191824 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/stager64",
"clientport": 44338,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "93.163.106.39",
"serverIP": "69.97.146.255",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=69.97.146.255 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.163.106.39 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.163.106.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=69.97.146.255 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.163.106.39 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.163.106.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678191824
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /stager64
clientport: 44338
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 93.163.106.39
serverIP: 69.97.146.255
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=54.70.23.42 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=134.114.71.168 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=134.114.71.168 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=54.70.23.42 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=134.114.71.168 spt=44338 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=134.114.71.168 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678191824 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/stager64",
"clientport": 44338,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "134.114.71.168",
"serverIP": "54.70.23.42",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=54.70.23.42 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=134.114.71.168 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=134.114.71.168 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:11 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=54.70.23.42 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=134.114.71.168 spt=44338 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:11 rt=1674678191824 request=/stager64 requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9946d0-75c74d77 cn2=44338 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=134.114.71.168 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678191824
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /stager64
clientport: 44338
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 134.114.71.168
serverIP: 54.70.23.42
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=128.171.26.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.196.61.181 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.196.61.181 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=128.171.26.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=78.196.61.181 spt=56436 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.196.61.181 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678201866 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/SiteLoader",
"clientport": 56436,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "78.196.61.181",
"serverIP": "128.171.26.59",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=128.171.26.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.196.61.181 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.196.61.181 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=128.171.26.59 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.196.61.181 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.196.61.181 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678201866
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /SiteLoader
clientport: 56436
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 78.196.61.181
serverIP: 128.171.26.59
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.238.245.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=250.128.114.183 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=250.128.114.183 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.238.245.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=250.128.114.183 spt=60734 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=250.128.114.183 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678203816 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/mPlayer",
"clientport": 60734,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "250.128.114.183",
"serverIP": "34.238.245.89",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.238.245.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=250.128.114.183 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=250.128.114.183 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.238.245.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=250.128.114.183 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=250.128.114.183 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678203816
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /mPlayer
clientport: 60734
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 250.128.114.183
serverIP: 34.238.245.89
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=145.13.89.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.109.105.80 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.109.105.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=145.13.89.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=40.109.105.80 spt=56436 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.109.105.80 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678201866 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/SiteLoader",
"clientport": 56436,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "40.109.105.80",
"serverIP": "145.13.89.105",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=145.13.89.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.109.105.80 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.109.105.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=145.13.89.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.109.105.80 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.109.105.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678201866
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /SiteLoader
clientport: 56436
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 40.109.105.80
serverIP: 145.13.89.105
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=110.225.180.44 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.135.46.103 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.135.46.103 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=110.225.180.44 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=254.135.46.103 spt=60734 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.135.46.103 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678203816 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/mPlayer",
"clientport": 60734,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "254.135.46.103",
"serverIP": "110.225.180.44",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=110.225.180.44 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.135.46.103 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.135.46.103 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=110.225.180.44 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.135.46.103 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.135.46.103 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678203816
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /mPlayer
clientport: 60734
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 254.135.46.103
serverIP: 110.225.180.44
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=118.198.189.113 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=126.74.186.66 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.74.186.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=118.198.189.113 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=126.74.186.66 spt=56436 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.74.186.66 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678201866 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/SiteLoader",
"clientport": 56436,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "126.74.186.66",
"serverIP": "118.198.189.113",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=118.198.189.113 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=126.74.186.66 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.74.186.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:21 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=118.198.189.113 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=126.74.186.66 spt=56436 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:21 rt=1674678201866 request=/SiteLoader requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea996e0a-4ff529ce cn2=56436 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.74.186.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678201866
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /SiteLoader
clientport: 56436
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 126.74.186.66
serverIP: 118.198.189.113
userName: -
|
Explain this syslog message
|
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.221.213.195 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.145.226.84 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.145.226.84 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.213.174.115",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.221.213.195 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=118.145.226.84 spt=60734 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36\" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.145.226.84 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1674678203816 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/mPlayer",
"clientport": 60734,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "118.145.226.84",
"serverIP": "153.221.213.195",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.221.213.195 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.145.226.84 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.145.226.84 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Jan 25 14:23:23 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=153.221.213.195 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.145.226.84 spt=60734 requestMethod=GET app=HTTP requestContext="-" start=Jan 25 2023 14:23:23 rt=1674678203816 request=/mPlayer requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36" dvchost=WAFirewall externalId=185ea9975a8-73c43360 cn2=60734 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.145.226.84 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.213.174.115', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1674678203816
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /mPlayer
clientport: 60734
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 118.145.226.84
serverIP: 153.221.213.195
userName: -
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=124.213.28.81 dst=156.42.71.50 protocol=tcp sport=59883 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 59883,
"message": "<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=124.213.28.81 dst=156.42.71.50 protocol=tcp sport=59883 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "124.213.28.81",
"serverIP": "156.42.71.50"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=124.213.28.81 dst=156.42.71.50 protocol=tcp sport=59883 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=124.213.28.81 dst=156.42.71.50 protocol=tcp sport=59883 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59883
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 124.213.28.81
serverIP: 156.42.71.50
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=182.108.212.129 dst=196.100.224.69 protocol=tcp sport=59883 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 59883,
"message": "<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=182.108.212.129 dst=196.100.224.69 protocol=tcp sport=59883 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "182.108.212.129",
"serverIP": "196.100.224.69"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=182.108.212.129 dst=196.100.224.69 protocol=tcp sport=59883 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=182.108.212.129 dst=196.100.224.69 protocol=tcp sport=59883 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59883
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 182.108.212.129
serverIP: 196.100.224.69
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=31.149.16.215 dst=96.233.208.134 protocol=tcp sport=59883 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 59883,
"message": "<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=31.149.16.215 dst=96.233.208.134 protocol=tcp sport=59883 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "31.149.16.215",
"serverIP": "96.233.208.134"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=31.149.16.215 dst=96.233.208.134 protocol=tcp sport=59883 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=31.149.16.215 dst=96.233.208.134 protocol=tcp sport=59883 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59883
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 31.149.16.215
serverIP: 96.233.208.134
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=79.27.56.203 dst=248.206.129.255 protocol=tcp sport=59883 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 59883,
"message": "<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=79.27.56.203 dst=248.206.129.255 protocol=tcp sport=59883 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "79.27.56.203",
"serverIP": "248.206.129.255"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=79.27.56.203 dst=248.206.129.255 protocol=tcp sport=59883 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1687466138.421920446 NORDC_MX400_1 l7_firewall src=79.27.56.203 dst=248.206.129.255 protocol=tcp sport=59883 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59883
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 79.27.56.203
serverIP: 248.206.129.255
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=13.100.53.210 dst=15.118.96.38 protocol=tcp sport=57876 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 57876,
"message": "<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=13.100.53.210 dst=15.118.96.38 protocol=tcp sport=57876 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "13.100.53.210",
"serverIP": "15.118.96.38"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=13.100.53.210 dst=15.118.96.38 protocol=tcp sport=57876 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=13.100.53.210 dst=15.118.96.38 protocol=tcp sport=57876 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57876
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 13.100.53.210
serverIP: 15.118.96.38
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=90.197.116.26 dst=207.60.243.183 protocol=tcp sport=57876 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 57876,
"message": "<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=90.197.116.26 dst=207.60.243.183 protocol=tcp sport=57876 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "90.197.116.26",
"serverIP": "207.60.243.183"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=90.197.116.26 dst=207.60.243.183 protocol=tcp sport=57876 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=90.197.116.26 dst=207.60.243.183 protocol=tcp sport=57876 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57876
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 90.197.116.26
serverIP: 207.60.243.183
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=168.78.174.217 dst=154.15.60.197 protocol=tcp sport=57876 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 57876,
"message": "<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=168.78.174.217 dst=154.15.60.197 protocol=tcp sport=57876 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "168.78.174.217",
"serverIP": "154.15.60.197"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=168.78.174.217 dst=154.15.60.197 protocol=tcp sport=57876 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=168.78.174.217 dst=154.15.60.197 protocol=tcp sport=57876 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57876
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 168.78.174.217
serverIP: 154.15.60.197
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=138.163.50.193 dst=178.160.178.47 protocol=tcp sport=57876 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 57876,
"message": "<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=138.163.50.193 dst=178.160.178.47 protocol=tcp sport=57876 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "138.163.50.193",
"serverIP": "178.160.178.47"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=138.163.50.193 dst=178.160.178.47 protocol=tcp sport=57876 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1687465760.735592101 NORDC_MX400_1 l7_firewall src=138.163.50.193 dst=178.160.178.47 protocol=tcp sport=57876 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57876
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 138.163.50.193
serverIP: 178.160.178.47
|
Explain this syslog message
|
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=109.105.223.15 dst=206.213.35.168 protocol=tcp sport=65195 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=109.105.223.15 dst=206.213.35.168 protocol=tcp sport=65195 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 65195,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "109.105.223.15",
"serverIP": "206.213.35.168"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=109.105.223.15 dst=206.213.35.168 protocol=tcp sport=65195 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=109.105.223.15 dst=206.213.35.168 protocol=tcp sport=65195 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 65195
protocol: 6
streamName: meraki_l7_firewall
clientIP: 109.105.223.15
serverIP: 206.213.35.168
|
Explain this syslog message
|
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=77.156.131.34 dst=98.162.36.2 protocol=tcp sport=65195 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=77.156.131.34 dst=98.162.36.2 protocol=tcp sport=65195 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 65195,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "77.156.131.34",
"serverIP": "98.162.36.2"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=77.156.131.34 dst=98.162.36.2 protocol=tcp sport=65195 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=77.156.131.34 dst=98.162.36.2 protocol=tcp sport=65195 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 65195
protocol: 6
streamName: meraki_l7_firewall
clientIP: 77.156.131.34
serverIP: 98.162.36.2
|
Explain this syslog message
|
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=190.181.227.191 dst=90.48.217.96 protocol=tcp sport=65195 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=190.181.227.191 dst=90.48.217.96 protocol=tcp sport=65195 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 65195,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "190.181.227.191",
"serverIP": "90.48.217.96"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=190.181.227.191 dst=90.48.217.96 protocol=tcp sport=65195 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=190.181.227.191 dst=90.48.217.96 protocol=tcp sport=65195 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 65195
protocol: 6
streamName: meraki_l7_firewall
clientIP: 190.181.227.191
serverIP: 90.48.217.96
|
Explain this syslog message
|
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=24.19.222.10 dst=76.36.79.30 protocol=tcp sport=65195 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=24.19.222.10 dst=76.36.79.30 protocol=tcp sport=65195 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 65195,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "24.19.222.10",
"serverIP": "76.36.79.30"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=24.19.222.10 dst=76.36.79.30 protocol=tcp sport=65195 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.87.229.81 1 1655799752.996073668 M23_MX67C_CRMarietta l7_firewall src=24.19.222.10 dst=76.36.79.30 protocol=tcp sport=65195 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 65195
protocol: 6
streamName: meraki_l7_firewall
clientIP: 24.19.222.10
serverIP: 76.36.79.30
|
Explain this syslog message
|
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=128.57.81.156 dst=126.90.57.12 protocol=tcp sport=51359 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=128.57.81.156 dst=126.90.57.12 protocol=tcp sport=51359 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51359,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "128.57.81.156",
"serverIP": "126.90.57.12"
}
|
Create a JSON artifact from the message
|
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=128.57.81.156 dst=126.90.57.12 protocol=tcp sport=51359 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=128.57.81.156 dst=126.90.57.12 protocol=tcp sport=51359 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51359
protocol: 6
streamName: meraki_l7_firewall
clientIP: 128.57.81.156
serverIP: 126.90.57.12
|
Explain this syslog message
|
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=242.135.46.252 dst=18.211.209.120 protocol=tcp sport=51359 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=242.135.46.252 dst=18.211.209.120 protocol=tcp sport=51359 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51359,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "242.135.46.252",
"serverIP": "18.211.209.120"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.