input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=242.135.46.252 dst=18.211.209.120 protocol=tcp sport=51359 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=242.135.46.252 dst=18.211.209.120 protocol=tcp sport=51359 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51359
protocol: 6
streamName: meraki_l7_firewall
clientIP: 242.135.46.252
serverIP: 18.211.209.120
|
Explain this syslog message
|
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=8.195.183.237 dst=0.189.196.29 protocol=tcp sport=51359 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=8.195.183.237 dst=0.189.196.29 protocol=tcp sport=51359 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51359,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "8.195.183.237",
"serverIP": "0.189.196.29"
}
|
Create a JSON artifact from the message
|
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=8.195.183.237 dst=0.189.196.29 protocol=tcp sport=51359 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=8.195.183.237 dst=0.189.196.29 protocol=tcp sport=51359 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51359
protocol: 6
streamName: meraki_l7_firewall
clientIP: 8.195.183.237
serverIP: 0.189.196.29
|
Explain this syslog message
|
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=24.47.177.213 dst=195.67.188.106 protocol=tcp sport=51359 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=24.47.177.213 dst=195.67.188.106 protocol=tcp sport=51359 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51359,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "24.47.177.213",
"serverIP": "195.67.188.106"
}
|
Create a JSON artifact from the message
|
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=24.47.177.213 dst=195.67.188.106 protocol=tcp sport=51359 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=24.47.177.213 dst=195.67.188.106 protocol=tcp sport=51359 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51359
protocol: 6
streamName: meraki_l7_firewall
clientIP: 24.47.177.213
serverIP: 195.67.188.106
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=88.97.236.109 dst=74.32.253.238 protocol=tcp sport=50097 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 50097,
"message": "<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=88.97.236.109 dst=74.32.253.238 protocol=tcp sport=50097 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "88.97.236.109",
"serverIP": "74.32.253.238"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=88.97.236.109 dst=74.32.253.238 protocol=tcp sport=50097 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=88.97.236.109 dst=74.32.253.238 protocol=tcp sport=50097 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 50097
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 88.97.236.109
serverIP: 74.32.253.238
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=66.0.202.145 dst=87.159.127.194 protocol=tcp sport=50097 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 50097,
"message": "<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=66.0.202.145 dst=87.159.127.194 protocol=tcp sport=50097 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "66.0.202.145",
"serverIP": "87.159.127.194"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=66.0.202.145 dst=87.159.127.194 protocol=tcp sport=50097 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=66.0.202.145 dst=87.159.127.194 protocol=tcp sport=50097 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 50097
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 66.0.202.145
serverIP: 87.159.127.194
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=18.136.232.4 dst=179.31.70.112 protocol=tcp sport=50097 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 50097,
"message": "<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=18.136.232.4 dst=179.31.70.112 protocol=tcp sport=50097 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "18.136.232.4",
"serverIP": "179.31.70.112"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=18.136.232.4 dst=179.31.70.112 protocol=tcp sport=50097 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=18.136.232.4 dst=179.31.70.112 protocol=tcp sport=50097 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 50097
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 18.136.232.4
serverIP: 179.31.70.112
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=150.220.191.233 dst=11.85.110.171 protocol=tcp sport=50097 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 50097,
"message": "<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=150.220.191.233 dst=11.85.110.171 protocol=tcp sport=50097 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "150.220.191.233",
"serverIP": "11.85.110.171"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=150.220.191.233 dst=11.85.110.171 protocol=tcp sport=50097 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=150.220.191.233 dst=11.85.110.171 protocol=tcp sport=50097 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 50097
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 150.220.191.233
serverIP: 11.85.110.171
|
Explain this syslog message
|
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=149.91.167.133 dst=119.107.101.32 protocol=tcp sport=58951 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 58951,
"message": "<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=149.91.167.133 dst=119.107.101.32 protocol=tcp sport=58951 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "149.91.167.133",
"serverIP": "119.107.101.32"
}
|
Create a JSON artifact from the message
|
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=149.91.167.133 dst=119.107.101.32 protocol=tcp sport=58951 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=149.91.167.133 dst=119.107.101.32 protocol=tcp sport=58951 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58951
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 149.91.167.133
serverIP: 119.107.101.32
|
Explain this syslog message
|
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=30.214.155.70 dst=152.211.122.207 protocol=tcp sport=58951 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 58951,
"message": "<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=30.214.155.70 dst=152.211.122.207 protocol=tcp sport=58951 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "30.214.155.70",
"serverIP": "152.211.122.207"
}
|
Create a JSON artifact from the message
|
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=30.214.155.70 dst=152.211.122.207 protocol=tcp sport=58951 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=30.214.155.70 dst=152.211.122.207 protocol=tcp sport=58951 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58951
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 30.214.155.70
serverIP: 152.211.122.207
|
Explain this syslog message
|
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=82.51.218.46 dst=210.166.214.253 protocol=tcp sport=58951 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 58951,
"message": "<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=82.51.218.46 dst=210.166.214.253 protocol=tcp sport=58951 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "82.51.218.46",
"serverIP": "210.166.214.253"
}
|
Create a JSON artifact from the message
|
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=82.51.218.46 dst=210.166.214.253 protocol=tcp sport=58951 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=82.51.218.46 dst=210.166.214.253 protocol=tcp sport=58951 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58951
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 82.51.218.46
serverIP: 210.166.214.253
|
Explain this syslog message
|
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=197.14.188.191 dst=90.191.27.51 protocol=tcp sport=58951 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 58951,
"message": "<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=197.14.188.191 dst=90.191.27.51 protocol=tcp sport=58951 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "197.14.188.191",
"serverIP": "90.191.27.51"
}
|
Create a JSON artifact from the message
|
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=197.14.188.191 dst=90.191.27.51 protocol=tcp sport=58951 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=197.14.188.191 dst=90.191.27.51 protocol=tcp sport=58951 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58951
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 197.14.188.191
serverIP: 90.191.27.51
|
Explain this syslog message
|
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=201.232.227.189 dpt=80 act=DENY msg=[] duser="-" src=155.38.91.174 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=155.38.91.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 13784,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1695280704841 ",
"message": "<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=201.232.227.189 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=155.38.91.174 spt=13784 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=155.38.91.174 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"barracuda_waf",
"ProxyIP:184.105.247.254",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "155.38.91.174",
"serverIP": "201.232.227.189",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=201.232.227.189 dpt=80 act=DENY msg=[] duser="-" src=155.38.91.174 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=155.38.91.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=201.232.227.189 dpt=80 act=DENY msg=[] duser="-" src=155.38.91.174 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=155.38.91.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 13784
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1695280704841
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'barracuda_waf', 'ProxyIP:184.105.247.254', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 155.38.91.174
serverIP: 201.232.227.189
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=5.28.90.30 dpt=80 act=DENY msg=[] duser="-" src=92.86.71.159 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=92.86.71.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 13784,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1695280704841 ",
"message": "<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=5.28.90.30 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=92.86.71.159 spt=13784 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=92.86.71.159 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"barracuda_waf",
"ProxyIP:184.105.247.254",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "92.86.71.159",
"serverIP": "5.28.90.30",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=5.28.90.30 dpt=80 act=DENY msg=[] duser="-" src=92.86.71.159 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=92.86.71.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=5.28.90.30 dpt=80 act=DENY msg=[] duser="-" src=92.86.71.159 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=92.86.71.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 13784
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1695280704841
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'barracuda_waf', 'ProxyIP:184.105.247.254', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 92.86.71.159
serverIP: 5.28.90.30
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=190.42.34.48 dpt=80 act=DENY msg=[] duser="-" src=73.154.36.231 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=73.154.36.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 13784,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1695280704841 ",
"message": "<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=190.42.34.48 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=73.154.36.231 spt=13784 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=73.154.36.231 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"barracuda_waf",
"ProxyIP:184.105.247.254",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "73.154.36.231",
"serverIP": "190.42.34.48",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=190.42.34.48 dpt=80 act=DENY msg=[] duser="-" src=73.154.36.231 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=73.154.36.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=190.42.34.48 dpt=80 act=DENY msg=[] duser="-" src=73.154.36.231 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=73.154.36.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 13784
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1695280704841
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'barracuda_waf', 'ProxyIP:184.105.247.254', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 73.154.36.231
serverIP: 190.42.34.48
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=3.42.34.78 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=74.183.225.245 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.183.225.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 35052,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/nation.php",
"localhostname": "WAFirewall",
"localstarttime": "1695281426214 ",
"message": "<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=3.42.34.78 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=74.183.225.245 spt=35052 requestMethod=POST app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication=\"Mozilla_33741328\" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.183.225.245 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "74.183.225.245",
"serverIP": "3.42.34.78",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=3.42.34.78 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=74.183.225.245 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.183.225.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=3.42.34.78 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=74.183.225.245 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.183.225.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35052
facilitycode: 23
facilitylabel: local7
fqdn: /nation.php
localhostname: WAFirewall
localstarttime: 1695281426214
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 74.183.225.245
serverIP: 3.42.34.78
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.237.177.74 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=192.136.118.188 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.136.118.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 35052,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/nation.php",
"localhostname": "WAFirewall",
"localstarttime": "1695281426214 ",
"message": "<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.237.177.74 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=192.136.118.188 spt=35052 requestMethod=POST app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication=\"Mozilla_33741328\" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.136.118.188 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "192.136.118.188",
"serverIP": "87.237.177.74",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.237.177.74 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=192.136.118.188 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.136.118.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.237.177.74 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=192.136.118.188 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.136.118.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35052
facilitycode: 23
facilitylabel: local7
fqdn: /nation.php
localhostname: WAFirewall
localstarttime: 1695281426214
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 192.136.118.188
serverIP: 87.237.177.74
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=174.129.121.162 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=254.48.117.225 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.48.117.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 35052,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/nation.php",
"localhostname": "WAFirewall",
"localstarttime": "1695281426214 ",
"message": "<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=174.129.121.162 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=254.48.117.225 spt=35052 requestMethod=POST app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication=\"Mozilla_33741328\" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.48.117.225 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "254.48.117.225",
"serverIP": "174.129.121.162",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=174.129.121.162 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=254.48.117.225 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.48.117.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=174.129.121.162 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=254.48.117.225 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.48.117.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35052
facilitycode: 23
facilitylabel: local7
fqdn: /nation.php
localhostname: WAFirewall
localstarttime: 1695281426214
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 254.48.117.225
serverIP: 174.129.121.162
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=135.79.222.180 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=253.179.33.221 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.179.33.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 39348,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/news.php",
"localhostname": "WAFirewall",
"localstarttime": "1695281429484 ",
"message": "<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=135.79.222.180 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=253.179.33.221 spt=39348 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.179.33.221 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "253.179.33.221",
"serverIP": "135.79.222.180",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=135.79.222.180 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=253.179.33.221 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.179.33.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=135.79.222.180 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=253.179.33.221 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.179.33.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 39348
facilitycode: 23
facilitylabel: local7
fqdn: /news.php
localhostname: WAFirewall
localstarttime: 1695281429484
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 253.179.33.221
serverIP: 135.79.222.180
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=92.160.246.9 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=143.84.178.109 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=143.84.178.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 39348,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/news.php",
"localhostname": "WAFirewall",
"localstarttime": "1695281429484 ",
"message": "<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=92.160.246.9 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=143.84.178.109 spt=39348 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=143.84.178.109 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "143.84.178.109",
"serverIP": "92.160.246.9",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=92.160.246.9 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=143.84.178.109 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=143.84.178.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=92.160.246.9 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=143.84.178.109 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=143.84.178.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 39348
facilitycode: 23
facilitylabel: local7
fqdn: /news.php
localhostname: WAFirewall
localstarttime: 1695281429484
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 143.84.178.109
serverIP: 92.160.246.9
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.112.80.120 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=85.234.51.135 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.234.51.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 39348,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/news.php",
"localhostname": "WAFirewall",
"localstarttime": "1695281429484 ",
"message": "<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.112.80.120 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=85.234.51.135 spt=39348 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.234.51.135 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "85.234.51.135",
"serverIP": "111.112.80.120",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.112.80.120 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=85.234.51.135 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.234.51.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.112.80.120 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=85.234.51.135 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.234.51.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 39348
facilitycode: 23
facilitylabel: local7
fqdn: /news.php
localhostname: WAFirewall
localstarttime: 1695281429484
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 85.234.51.135
serverIP: 111.112.80.120
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.163.110.41 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=227.114.29.59 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.114.29.59 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 39896,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/kw4F",
"localhostname": "WAFirewall",
"localstarttime": "1695281451375 ",
"message": "<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.163.110.41 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=227.114.29.59 spt=39896 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.114.29.59 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "227.114.29.59",
"serverIP": "0.163.110.41",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.163.110.41 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=227.114.29.59 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.114.29.59 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.163.110.41 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=227.114.29.59 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.114.29.59 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 39896
facilitycode: 23
facilitylabel: local7
fqdn: /kw4F
localhostname: WAFirewall
localstarttime: 1695281451375
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 227.114.29.59
serverIP: 0.163.110.41
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=199.149.138.164 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=2.31.166.111 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=2.31.166.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 40716,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/8.bin",
"localhostname": "WAFirewall",
"localstarttime": "1695281430521 ",
"message": "<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=199.149.138.164 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=2.31.166.111 spt=40716 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=2.31.166.111 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "2.31.166.111",
"serverIP": "199.149.138.164",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=199.149.138.164 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=2.31.166.111 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=2.31.166.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=199.149.138.164 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=2.31.166.111 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=2.31.166.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 40716
facilitycode: 23
facilitylabel: local7
fqdn: /8.bin
localhostname: WAFirewall
localstarttime: 1695281430521
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 2.31.166.111
serverIP: 199.149.138.164
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=185.225.214.14 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=181.198.106.124 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=181.198.106.124 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 39896,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/kw4F",
"localhostname": "WAFirewall",
"localstarttime": "1695281451375 ",
"message": "<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=185.225.214.14 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=181.198.106.124 spt=39896 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=181.198.106.124 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "181.198.106.124",
"serverIP": "185.225.214.14",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=185.225.214.14 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=181.198.106.124 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=181.198.106.124 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=185.225.214.14 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=181.198.106.124 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=181.198.106.124 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 39896
facilitycode: 23
facilitylabel: local7
fqdn: /kw4F
localhostname: WAFirewall
localstarttime: 1695281451375
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 181.198.106.124
serverIP: 185.225.214.14
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.211.52.250 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=194.151.159.72 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=194.151.159.72 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 40716,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/8.bin",
"localhostname": "WAFirewall",
"localstarttime": "1695281430521 ",
"message": "<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.211.52.250 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=194.151.159.72 spt=40716 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=194.151.159.72 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "194.151.159.72",
"serverIP": "213.211.52.250",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.211.52.250 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=194.151.159.72 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=194.151.159.72 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.211.52.250 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=194.151.159.72 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=194.151.159.72 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 40716
facilitycode: 23
facilitylabel: local7
fqdn: /8.bin
localhostname: WAFirewall
localstarttime: 1695281430521
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 194.151.159.72
serverIP: 213.211.52.250
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=57.113.200.116 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=59.36.205.251 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.36.205.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 39896,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/kw4F",
"localhostname": "WAFirewall",
"localstarttime": "1695281451375 ",
"message": "<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=57.113.200.116 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=59.36.205.251 spt=39896 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.36.205.251 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "59.36.205.251",
"serverIP": "57.113.200.116",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=57.113.200.116 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=59.36.205.251 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.36.205.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=57.113.200.116 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=59.36.205.251 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.36.205.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 39896
facilitycode: 23
facilitylabel: local7
fqdn: /kw4F
localhostname: WAFirewall
localstarttime: 1695281451375
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 59.36.205.251
serverIP: 57.113.200.116
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.253.240.36 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=220.23.10.217 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.23.10.217 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 40716,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/8.bin",
"localhostname": "WAFirewall",
"localstarttime": "1695281430521 ",
"message": "<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.253.240.36 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=220.23.10.217 spt=40716 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.23.10.217 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "220.23.10.217",
"serverIP": "94.253.240.36",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.253.240.36 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=220.23.10.217 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.23.10.217 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.253.240.36 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=220.23.10.217 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.23.10.217 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 40716
facilitycode: 23
facilitylabel: local7
fqdn: /8.bin
localhostname: WAFirewall
localstarttime: 1695281430521
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 220.23.10.217
serverIP: 94.253.240.36
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=132.43.102.123 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=112.147.211.223 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=112.147.211.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 34490,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab",
"localhostname": "WAFirewall",
"localstarttime": "1695281447304 ",
"message": "<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=132.43.102.123 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=112.147.211.223 spt=34490 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication=\"Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31\" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=112.147.211.223 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "112.147.211.223",
"serverIP": "132.43.102.123",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=132.43.102.123 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=112.147.211.223 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=112.147.211.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=132.43.102.123 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=112.147.211.223 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=112.147.211.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 34490
facilitycode: 23
facilitylabel: local7
fqdn: /c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab
localhostname: WAFirewall
localstarttime: 1695281447304
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 112.147.211.223
serverIP: 132.43.102.123
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=235.201.1.134 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=0.237.13.30 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.237.13.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 46418,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/qd.CHM",
"localhostname": "WAFirewall",
"localstarttime": "1695281435035 ",
"message": "<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=235.201.1.134 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=0.237.13.30 spt=46418 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.237.13.30 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "0.237.13.30",
"serverIP": "235.201.1.134",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=235.201.1.134 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=0.237.13.30 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.237.13.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=235.201.1.134 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=0.237.13.30 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.237.13.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46418
facilitycode: 23
facilitylabel: local7
fqdn: /qd.CHM
localhostname: WAFirewall
localstarttime: 1695281435035
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 0.237.13.30
serverIP: 235.201.1.134
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.36.119.247 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=140.83.226.37 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.83.226.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 34490,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab",
"localhostname": "WAFirewall",
"localstarttime": "1695281447304 ",
"message": "<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.36.119.247 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=140.83.226.37 spt=34490 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication=\"Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31\" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.83.226.37 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "140.83.226.37",
"serverIP": "183.36.119.247",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.36.119.247 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=140.83.226.37 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.83.226.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.36.119.247 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=140.83.226.37 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.83.226.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 34490
facilitycode: 23
facilitylabel: local7
fqdn: /c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab
localhostname: WAFirewall
localstarttime: 1695281447304
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 140.83.226.37
serverIP: 183.36.119.247
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=192.57.170.154 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=88.33.62.168 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.33.62.168 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 46418,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/qd.CHM",
"localhostname": "WAFirewall",
"localstarttime": "1695281435035 ",
"message": "<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=192.57.170.154 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=88.33.62.168 spt=46418 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.33.62.168 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "88.33.62.168",
"serverIP": "192.57.170.154",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=192.57.170.154 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=88.33.62.168 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.33.62.168 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=192.57.170.154 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=88.33.62.168 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.33.62.168 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46418
facilitycode: 23
facilitylabel: local7
fqdn: /qd.CHM
localhostname: WAFirewall
localstarttime: 1695281435035
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 88.33.62.168
serverIP: 192.57.170.154
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.88.10.244 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=26.186.72.93 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.186.72.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 34490,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab",
"localhostname": "WAFirewall",
"localstarttime": "1695281447304 ",
"message": "<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.88.10.244 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=26.186.72.93 spt=34490 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication=\"Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31\" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.186.72.93 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "26.186.72.93",
"serverIP": "233.88.10.244",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.88.10.244 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=26.186.72.93 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.186.72.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.88.10.244 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=26.186.72.93 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.186.72.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 34490
facilitycode: 23
facilitylabel: local7
fqdn: /c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab
localhostname: WAFirewall
localstarttime: 1695281447304
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 26.186.72.93
serverIP: 233.88.10.244
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=1.228.183.101 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=51.195.126.34 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.195.126.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 46418,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/qd.CHM",
"localhostname": "WAFirewall",
"localstarttime": "1695281435035 ",
"message": "<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=1.228.183.101 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=51.195.126.34 spt=46418 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.195.126.34 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "51.195.126.34",
"serverIP": "1.228.183.101",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=1.228.183.101 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=51.195.126.34 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.195.126.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=1.228.183.101 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=51.195.126.34 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.195.126.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46418
facilitycode: 23
facilitylabel: local7
fqdn: /qd.CHM
localhostname: WAFirewall
localstarttime: 1695281435035
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 51.195.126.34
serverIP: 1.228.183.101
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=193.27.119.82 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=224.223.107.178 spt=47848 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435926 request=/zMLUH93A requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d516-3bda5987 cn2=47848 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.223.107.178 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 47848,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/zMLUH93A",
"localhostname": "WAFirewall",
"localstarttime": "1695281435926 ",
"message": "<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=193.27.119.82 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=224.223.107.178 spt=47848 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:35 rt=1695281435926 request=/zMLUH93A requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5d516-3bda5987 cn2=47848 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.223.107.178 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "224.223.107.178",
"serverIP": "193.27.119.82",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=193.27.119.82 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=224.223.107.178 spt=47848 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435926 request=/zMLUH93A requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d516-3bda5987 cn2=47848 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.223.107.178 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=193.27.119.82 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=224.223.107.178 spt=47848 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435926 request=/zMLUH93A requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d516-3bda5987 cn2=47848 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.223.107.178 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47848
facilitycode: 23
facilitylabel: local7
fqdn: /zMLUH93A
localhostname: WAFirewall
localstarttime: 1695281435926
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK']
vendorcode: 342
streamName: barracuda_waf
clientIP: 224.223.107.178
serverIP: 193.27.119.82
userName: -
|
Explain this syslog message
|
<185>Sep 21 02:30:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.244.182.40 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=36.169.171.55 spt=43602 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:32 rt=1695281432816 request=/UnityPlayer.dll requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5c8f0-31fd066b cn2=43602 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=36.169.171.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 43602,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/UnityPlayer.dll",
"localhostname": "WAFirewall",
"localstarttime": "1695281432816 ",
"message": "<185>Sep 21 02:30:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.244.182.40 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=36.169.171.55 spt=43602 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:32 rt=1695281432816 request=/UnityPlayer.dll requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5c8f0-31fd066b cn2=43602 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=36.169.171.55 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:43.158.218.124",
"barracuda_waf_GEO_IP_BLOCK"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "36.169.171.55",
"serverIP": "230.244.182.40",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 21 02:30:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.244.182.40 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=36.169.171.55 spt=43602 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:32 rt=1695281432816 request=/UnityPlayer.dll requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5c8f0-31fd066b cn2=43602 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=36.169.171.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.