input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=242.135.46.252 dst=18.211.209.120 protocol=tcp sport=51359 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=242.135.46.252 dst=18.211.209.120 protocol=tcp sport=51359 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 51359 protocol: 6 streamName: meraki_l7_firewall clientIP: 242.135.46.252 serverIP: 18.211.209.120
Explain this syslog message
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=8.195.183.237 dst=0.189.196.29 protocol=tcp sport=51359 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=8.195.183.237 dst=0.189.196.29 protocol=tcp sport=51359 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 51359, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "8.195.183.237", "serverIP": "0.189.196.29" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=8.195.183.237 dst=0.189.196.29 protocol=tcp sport=51359 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=8.195.183.237 dst=0.189.196.29 protocol=tcp sport=51359 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 51359 protocol: 6 streamName: meraki_l7_firewall clientIP: 8.195.183.237 serverIP: 0.189.196.29
Explain this syslog message
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=24.47.177.213 dst=195.67.188.106 protocol=tcp sport=51359 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=24.47.177.213 dst=195.67.188.106 protocol=tcp sport=51359 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 51359, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "24.47.177.213", "serverIP": "195.67.188.106" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=24.47.177.213 dst=195.67.188.106 protocol=tcp sport=51359 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1655799772.894653471 M52_MX67C_Loxley l7_firewall src=24.47.177.213 dst=195.67.188.106 protocol=tcp sport=51359 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 51359 protocol: 6 streamName: meraki_l7_firewall clientIP: 24.47.177.213 serverIP: 195.67.188.106
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=88.97.236.109 dst=74.32.253.238 protocol=tcp sport=50097 dport=443 decision=blocked
{ "action": "block", "clientport": 50097, "message": "<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=88.97.236.109 dst=74.32.253.238 protocol=tcp sport=50097 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "88.97.236.109", "serverIP": "74.32.253.238" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=88.97.236.109 dst=74.32.253.238 protocol=tcp sport=50097 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=88.97.236.109 dst=74.32.253.238 protocol=tcp sport=50097 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 50097 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 88.97.236.109 serverIP: 74.32.253.238
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=66.0.202.145 dst=87.159.127.194 protocol=tcp sport=50097 dport=443 decision=blocked
{ "action": "block", "clientport": 50097, "message": "<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=66.0.202.145 dst=87.159.127.194 protocol=tcp sport=50097 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "66.0.202.145", "serverIP": "87.159.127.194" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=66.0.202.145 dst=87.159.127.194 protocol=tcp sport=50097 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=66.0.202.145 dst=87.159.127.194 protocol=tcp sport=50097 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 50097 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 66.0.202.145 serverIP: 87.159.127.194
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=18.136.232.4 dst=179.31.70.112 protocol=tcp sport=50097 dport=443 decision=blocked
{ "action": "block", "clientport": 50097, "message": "<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=18.136.232.4 dst=179.31.70.112 protocol=tcp sport=50097 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "18.136.232.4", "serverIP": "179.31.70.112" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=18.136.232.4 dst=179.31.70.112 protocol=tcp sport=50097 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=18.136.232.4 dst=179.31.70.112 protocol=tcp sport=50097 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 50097 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 18.136.232.4 serverIP: 179.31.70.112
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=150.220.191.233 dst=11.85.110.171 protocol=tcp sport=50097 dport=443 decision=blocked
{ "action": "block", "clientport": 50097, "message": "<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=150.220.191.233 dst=11.85.110.171 protocol=tcp sport=50097 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "150.220.191.233", "serverIP": "11.85.110.171" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=150.220.191.233 dst=11.85.110.171 protocol=tcp sport=50097 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688037228.070065846 NORDC_MX400_1 l7_firewall src=150.220.191.233 dst=11.85.110.171 protocol=tcp sport=50097 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 50097 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 150.220.191.233 serverIP: 11.85.110.171
Explain this syslog message
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=149.91.167.133 dst=119.107.101.32 protocol=tcp sport=58951 dport=443 decision=blocked
{ "action": "block", "clientport": 58951, "message": "<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=149.91.167.133 dst=119.107.101.32 protocol=tcp sport=58951 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "149.91.167.133", "serverIP": "119.107.101.32" }
Create a JSON artifact from the message
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=149.91.167.133 dst=119.107.101.32 protocol=tcp sport=58951 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=149.91.167.133 dst=119.107.101.32 protocol=tcp sport=58951 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 58951 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 149.91.167.133 serverIP: 119.107.101.32
Explain this syslog message
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=30.214.155.70 dst=152.211.122.207 protocol=tcp sport=58951 dport=443 decision=blocked
{ "action": "block", "clientport": 58951, "message": "<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=30.214.155.70 dst=152.211.122.207 protocol=tcp sport=58951 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "30.214.155.70", "serverIP": "152.211.122.207" }
Create a JSON artifact from the message
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=30.214.155.70 dst=152.211.122.207 protocol=tcp sport=58951 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=30.214.155.70 dst=152.211.122.207 protocol=tcp sport=58951 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 58951 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 30.214.155.70 serverIP: 152.211.122.207
Explain this syslog message
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=82.51.218.46 dst=210.166.214.253 protocol=tcp sport=58951 dport=443 decision=blocked
{ "action": "block", "clientport": 58951, "message": "<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=82.51.218.46 dst=210.166.214.253 protocol=tcp sport=58951 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "82.51.218.46", "serverIP": "210.166.214.253" }
Create a JSON artifact from the message
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=82.51.218.46 dst=210.166.214.253 protocol=tcp sport=58951 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=82.51.218.46 dst=210.166.214.253 protocol=tcp sport=58951 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 58951 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 82.51.218.46 serverIP: 210.166.214.253
Explain this syslog message
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=197.14.188.191 dst=90.191.27.51 protocol=tcp sport=58951 dport=443 decision=blocked
{ "action": "block", "clientport": 58951, "message": "<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=197.14.188.191 dst=90.191.27.51 protocol=tcp sport=58951 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "197.14.188.191", "serverIP": "90.191.27.51" }
Create a JSON artifact from the message
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=197.14.188.191 dst=90.191.27.51 protocol=tcp sport=58951 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=74.95.48.161 1 1688037490.755303471 M83_MX67C_MuscleShoals l7_firewall src=197.14.188.191 dst=90.191.27.51 protocol=tcp sport=58951 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 58951 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 197.14.188.191 serverIP: 90.191.27.51
Explain this syslog message
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=201.232.227.189 dpt=80 act=DENY msg=[] duser="-" src=155.38.91.174 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=155.38.91.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 13784, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1695280704841 ", "message": "<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=201.232.227.189 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=155.38.91.174 spt=13784 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=155.38.91.174 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "barracuda_waf", "ProxyIP:184.105.247.254", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "155.38.91.174", "serverIP": "201.232.227.189", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=201.232.227.189 dpt=80 act=DENY msg=[] duser="-" src=155.38.91.174 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=155.38.91.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=201.232.227.189 dpt=80 act=DENY msg=[] duser="-" src=155.38.91.174 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=155.38.91.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 13784 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1695280704841 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'barracuda_waf', 'ProxyIP:184.105.247.254', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 155.38.91.174 serverIP: 201.232.227.189 userName: -
Explain this syslog message
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=5.28.90.30 dpt=80 act=DENY msg=[] duser="-" src=92.86.71.159 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=92.86.71.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 13784, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1695280704841 ", "message": "<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=5.28.90.30 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=92.86.71.159 spt=13784 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=92.86.71.159 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "barracuda_waf", "ProxyIP:184.105.247.254", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "92.86.71.159", "serverIP": "5.28.90.30", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=5.28.90.30 dpt=80 act=DENY msg=[] duser="-" src=92.86.71.159 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=92.86.71.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=5.28.90.30 dpt=80 act=DENY msg=[] duser="-" src=92.86.71.159 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=92.86.71.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 13784 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1695280704841 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'barracuda_waf', 'ProxyIP:184.105.247.254', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 92.86.71.159 serverIP: 5.28.90.30 userName: -
Explain this syslog message
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=190.42.34.48 dpt=80 act=DENY msg=[] duser="-" src=73.154.36.231 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=73.154.36.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 13784, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1695280704841 ", "message": "<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=190.42.34.48 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=73.154.36.231 spt=13784 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=73.154.36.231 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "barracuda_waf", "ProxyIP:184.105.247.254", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "73.154.36.231", "serverIP": "190.42.34.48", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=190.42.34.48 dpt=80 act=DENY msg=[] duser="-" src=73.154.36.231 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=73.154.36.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:18:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=190.42.34.48 dpt=80 act=DENY msg=[] duser="-" src=73.154.36.231 spt=13784 requestMethod="-" app=HTTP requestContext="-" start=Sep 21 2023 02:18:24 rt=1695280704841 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ab69aad49-81efea49 cn2=13784 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=73.154.36.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 13784 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1695280704841 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'barracuda_waf', 'ProxyIP:184.105.247.254', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 73.154.36.231 serverIP: 190.42.34.48 userName: -
Explain this syslog message
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=3.42.34.78 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=74.183.225.245 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.183.225.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35052, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/nation.php", "localhostname": "WAFirewall", "localstarttime": "1695281426214 ", "message": "<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=3.42.34.78 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=74.183.225.245 spt=35052 requestMethod=POST app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication=\"Mozilla_33741328\" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.183.225.245 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "74.183.225.245", "serverIP": "3.42.34.78", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=3.42.34.78 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=74.183.225.245 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.183.225.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=3.42.34.78 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=74.183.225.245 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.183.225.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35052 facilitycode: 23 facilitylabel: local7 fqdn: /nation.php localhostname: WAFirewall localstarttime: 1695281426214 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 74.183.225.245 serverIP: 3.42.34.78 userName: -
Explain this syslog message
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.237.177.74 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=192.136.118.188 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.136.118.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35052, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/nation.php", "localhostname": "WAFirewall", "localstarttime": "1695281426214 ", "message": "<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.237.177.74 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=192.136.118.188 spt=35052 requestMethod=POST app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication=\"Mozilla_33741328\" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.136.118.188 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "192.136.118.188", "serverIP": "87.237.177.74", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.237.177.74 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=192.136.118.188 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.136.118.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.237.177.74 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=192.136.118.188 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.136.118.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35052 facilitycode: 23 facilitylabel: local7 fqdn: /nation.php localhostname: WAFirewall localstarttime: 1695281426214 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 192.136.118.188 serverIP: 87.237.177.74 userName: -
Explain this syslog message
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=174.129.121.162 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=254.48.117.225 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.48.117.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35052, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/nation.php", "localhostname": "WAFirewall", "localstarttime": "1695281426214 ", "message": "<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=174.129.121.162 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=254.48.117.225 spt=35052 requestMethod=POST app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication=\"Mozilla_33741328\" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.48.117.225 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "254.48.117.225", "serverIP": "174.129.121.162", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=174.129.121.162 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=254.48.117.225 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.48.117.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=174.129.121.162 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=254.48.117.225 spt=35052 requestMethod=POST app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:26 rt=1695281426214 request=/nation.php requestClientApplication="Mozilla_33741328" dvchost=WAFirewall externalId=18ab6a5af26-37d13c35 cn2=35052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.48.117.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35052 facilitycode: 23 facilitylabel: local7 fqdn: /nation.php localhostname: WAFirewall localstarttime: 1695281426214 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 254.48.117.225 serverIP: 174.129.121.162 userName: -
Explain this syslog message
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=135.79.222.180 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=253.179.33.221 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.179.33.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 39348, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/news.php", "localhostname": "WAFirewall", "localstarttime": "1695281429484 ", "message": "<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=135.79.222.180 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=253.179.33.221 spt=39348 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.179.33.221 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "253.179.33.221", "serverIP": "135.79.222.180", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=135.79.222.180 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=253.179.33.221 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.179.33.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=135.79.222.180 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=253.179.33.221 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.179.33.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 39348 facilitycode: 23 facilitylabel: local7 fqdn: /news.php localhostname: WAFirewall localstarttime: 1695281429484 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 253.179.33.221 serverIP: 135.79.222.180 userName: -
Explain this syslog message
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=92.160.246.9 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=143.84.178.109 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=143.84.178.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 39348, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/news.php", "localhostname": "WAFirewall", "localstarttime": "1695281429484 ", "message": "<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=92.160.246.9 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=143.84.178.109 spt=39348 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=143.84.178.109 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "143.84.178.109", "serverIP": "92.160.246.9", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=92.160.246.9 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=143.84.178.109 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=143.84.178.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=92.160.246.9 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=143.84.178.109 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=143.84.178.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 39348 facilitycode: 23 facilitylabel: local7 fqdn: /news.php localhostname: WAFirewall localstarttime: 1695281429484 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 143.84.178.109 serverIP: 92.160.246.9 userName: -
Explain this syslog message
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.112.80.120 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=85.234.51.135 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.234.51.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 39348, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/news.php", "localhostname": "WAFirewall", "localstarttime": "1695281429484 ", "message": "<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.112.80.120 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=85.234.51.135 spt=39348 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.234.51.135 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "85.234.51.135", "serverIP": "111.112.80.120", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.112.80.120 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=85.234.51.135 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.234.51.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.112.80.120 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=85.234.51.135 spt=39348 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:29 rt=1695281429484 request=/news.php requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bbec-35ff2f82 cn2=39348 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.234.51.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 39348 facilitycode: 23 facilitylabel: local7 fqdn: /news.php localhostname: WAFirewall localstarttime: 1695281429484 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 85.234.51.135 serverIP: 111.112.80.120 userName: -
Explain this syslog message
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.163.110.41 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=227.114.29.59 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.114.29.59 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 39896, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/kw4F", "localhostname": "WAFirewall", "localstarttime": "1695281451375 ", "message": "<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.163.110.41 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=227.114.29.59 spt=39896 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.114.29.59 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "227.114.29.59", "serverIP": "0.163.110.41", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.163.110.41 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=227.114.29.59 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.114.29.59 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.163.110.41 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=227.114.29.59 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.114.29.59 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 39896 facilitycode: 23 facilitylabel: local7 fqdn: /kw4F localhostname: WAFirewall localstarttime: 1695281451375 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 227.114.29.59 serverIP: 0.163.110.41 userName: -
Explain this syslog message
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=199.149.138.164 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=2.31.166.111 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=2.31.166.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 40716, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/8.bin", "localhostname": "WAFirewall", "localstarttime": "1695281430521 ", "message": "<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=199.149.138.164 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=2.31.166.111 spt=40716 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=2.31.166.111 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "2.31.166.111", "serverIP": "199.149.138.164", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=199.149.138.164 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=2.31.166.111 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=2.31.166.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=199.149.138.164 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=2.31.166.111 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=2.31.166.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 40716 facilitycode: 23 facilitylabel: local7 fqdn: /8.bin localhostname: WAFirewall localstarttime: 1695281430521 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 2.31.166.111 serverIP: 199.149.138.164 userName: -
Explain this syslog message
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=185.225.214.14 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=181.198.106.124 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=181.198.106.124 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 39896, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/kw4F", "localhostname": "WAFirewall", "localstarttime": "1695281451375 ", "message": "<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=185.225.214.14 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=181.198.106.124 spt=39896 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=181.198.106.124 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "181.198.106.124", "serverIP": "185.225.214.14", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=185.225.214.14 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=181.198.106.124 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=181.198.106.124 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=185.225.214.14 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=181.198.106.124 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=181.198.106.124 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 39896 facilitycode: 23 facilitylabel: local7 fqdn: /kw4F localhostname: WAFirewall localstarttime: 1695281451375 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 181.198.106.124 serverIP: 185.225.214.14 userName: -
Explain this syslog message
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.211.52.250 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=194.151.159.72 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=194.151.159.72 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 40716, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/8.bin", "localhostname": "WAFirewall", "localstarttime": "1695281430521 ", "message": "<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.211.52.250 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=194.151.159.72 spt=40716 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=194.151.159.72 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "194.151.159.72", "serverIP": "213.211.52.250", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.211.52.250 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=194.151.159.72 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=194.151.159.72 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.211.52.250 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=194.151.159.72 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=194.151.159.72 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 40716 facilitycode: 23 facilitylabel: local7 fqdn: /8.bin localhostname: WAFirewall localstarttime: 1695281430521 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 194.151.159.72 serverIP: 213.211.52.250 userName: -
Explain this syslog message
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=57.113.200.116 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=59.36.205.251 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.36.205.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 39896, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/kw4F", "localhostname": "WAFirewall", "localstarttime": "1695281451375 ", "message": "<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=57.113.200.116 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=59.36.205.251 spt=39896 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.36.205.251 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "59.36.205.251", "serverIP": "57.113.200.116", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=57.113.200.116 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=59.36.205.251 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.36.205.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:51 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=57.113.200.116 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=59.36.205.251 spt=39896 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:51 rt=1695281451375 request=/kw4F requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a6116f-35ff2e7c cn2=39896 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.36.205.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 39896 facilitycode: 23 facilitylabel: local7 fqdn: /kw4F localhostname: WAFirewall localstarttime: 1695281451375 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 59.36.205.251 serverIP: 57.113.200.116 userName: -
Explain this syslog message
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.253.240.36 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=220.23.10.217 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.23.10.217 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 40716, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/8.bin", "localhostname": "WAFirewall", "localstarttime": "1695281430521 ", "message": "<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.253.240.36 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=220.23.10.217 spt=40716 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.23.10.217 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "220.23.10.217", "serverIP": "94.253.240.36", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.253.240.36 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=220.23.10.217 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.23.10.217 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.253.240.36 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=220.23.10.217 spt=40716 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:30 rt=1695281430521 request=/8.bin requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5bff9-44b70f38 cn2=40716 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.23.10.217 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 40716 facilitycode: 23 facilitylabel: local7 fqdn: /8.bin localhostname: WAFirewall localstarttime: 1695281430521 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 220.23.10.217 serverIP: 94.253.240.36 userName: -
Explain this syslog message
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=132.43.102.123 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=112.147.211.223 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=112.147.211.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 34490, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab", "localhostname": "WAFirewall", "localstarttime": "1695281447304 ", "message": "<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=132.43.102.123 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=112.147.211.223 spt=34490 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication=\"Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31\" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=112.147.211.223 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "112.147.211.223", "serverIP": "132.43.102.123", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=132.43.102.123 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=112.147.211.223 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=112.147.211.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=132.43.102.123 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=112.147.211.223 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=112.147.211.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 34490 facilitycode: 23 facilitylabel: local7 fqdn: /c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab localhostname: WAFirewall localstarttime: 1695281447304 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 112.147.211.223 serverIP: 132.43.102.123 userName: -
Explain this syslog message
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=235.201.1.134 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=0.237.13.30 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.237.13.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 46418, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/qd.CHM", "localhostname": "WAFirewall", "localstarttime": "1695281435035 ", "message": "<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=235.201.1.134 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=0.237.13.30 spt=46418 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.237.13.30 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "0.237.13.30", "serverIP": "235.201.1.134", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=235.201.1.134 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=0.237.13.30 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.237.13.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=235.201.1.134 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=0.237.13.30 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.237.13.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 46418 facilitycode: 23 facilitylabel: local7 fqdn: /qd.CHM localhostname: WAFirewall localstarttime: 1695281435035 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 0.237.13.30 serverIP: 235.201.1.134 userName: -
Explain this syslog message
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.36.119.247 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=140.83.226.37 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.83.226.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 34490, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab", "localhostname": "WAFirewall", "localstarttime": "1695281447304 ", "message": "<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.36.119.247 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=140.83.226.37 spt=34490 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication=\"Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31\" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.83.226.37 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "140.83.226.37", "serverIP": "183.36.119.247", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.36.119.247 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=140.83.226.37 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.83.226.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.36.119.247 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=140.83.226.37 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.83.226.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 34490 facilitycode: 23 facilitylabel: local7 fqdn: /c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab localhostname: WAFirewall localstarttime: 1695281447304 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 140.83.226.37 serverIP: 183.36.119.247 userName: -
Explain this syslog message
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=192.57.170.154 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=88.33.62.168 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.33.62.168 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 46418, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/qd.CHM", "localhostname": "WAFirewall", "localstarttime": "1695281435035 ", "message": "<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=192.57.170.154 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=88.33.62.168 spt=46418 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.33.62.168 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "88.33.62.168", "serverIP": "192.57.170.154", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=192.57.170.154 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=88.33.62.168 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.33.62.168 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=192.57.170.154 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=88.33.62.168 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.33.62.168 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 46418 facilitycode: 23 facilitylabel: local7 fqdn: /qd.CHM localhostname: WAFirewall localstarttime: 1695281435035 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 88.33.62.168 serverIP: 192.57.170.154 userName: -
Explain this syslog message
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.88.10.244 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=26.186.72.93 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.186.72.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 34490, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab", "localhostname": "WAFirewall", "localstarttime": "1695281447304 ", "message": "<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.88.10.244 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=26.186.72.93 spt=34490 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication=\"Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31\" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.186.72.93 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "26.186.72.93", "serverIP": "233.88.10.244", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.88.10.244 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=26.186.72.93 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.186.72.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:47 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.88.10.244 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=26.186.72.93 spt=34490 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:47 rt=1695281447304 request=/c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab requestClientApplication="Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31" dvchost=WAFirewall externalId=18ab6a60188-37013890 cn2=34490 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.186.72.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 34490 facilitycode: 23 facilitylabel: local7 fqdn: /c/msdownload/update/software/update/2021/11/6632de33-967441-x86.cab localhostname: WAFirewall localstarttime: 1695281447304 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 26.186.72.93 serverIP: 233.88.10.244 userName: -
Explain this syslog message
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=1.228.183.101 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=51.195.126.34 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.195.126.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 46418, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/qd.CHM", "localhostname": "WAFirewall", "localstarttime": "1695281435035 ", "message": "<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=1.228.183.101 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=51.195.126.34 spt=46418 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.195.126.34 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "51.195.126.34", "serverIP": "1.228.183.101", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=1.228.183.101 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=51.195.126.34 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.195.126.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=1.228.183.101 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=51.195.126.34 spt=46418 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435035 request=/qd.CHM requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d19b-32fe0f74 cn2=46418 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.195.126.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 46418 facilitycode: 23 facilitylabel: local7 fqdn: /qd.CHM localhostname: WAFirewall localstarttime: 1695281435035 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 51.195.126.34 serverIP: 1.228.183.101 userName: -
Explain this syslog message
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=193.27.119.82 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=224.223.107.178 spt=47848 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435926 request=/zMLUH93A requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d516-3bda5987 cn2=47848 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.223.107.178 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 47848, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/zMLUH93A", "localhostname": "WAFirewall", "localstarttime": "1695281435926 ", "message": "<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=193.27.119.82 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=224.223.107.178 spt=47848 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:35 rt=1695281435926 request=/zMLUH93A requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5d516-3bda5987 cn2=47848 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.223.107.178 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "224.223.107.178", "serverIP": "193.27.119.82", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=193.27.119.82 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=224.223.107.178 spt=47848 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435926 request=/zMLUH93A requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d516-3bda5987 cn2=47848 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.223.107.178 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 21 02:30:35 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=193.27.119.82 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=224.223.107.178 spt=47848 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:35 rt=1695281435926 request=/zMLUH93A requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5d516-3bda5987 cn2=47848 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.223.107.178 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 47848 facilitycode: 23 facilitylabel: local7 fqdn: /zMLUH93A localhostname: WAFirewall localstarttime: 1695281435926 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:43.158.218.124', 'barracuda_waf_GEO_IP_BLOCK'] vendorcode: 342 streamName: barracuda_waf clientIP: 224.223.107.178 serverIP: 193.27.119.82 userName: -
Explain this syslog message
<185>Sep 21 02:30:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.244.182.40 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=36.169.171.55 spt=43602 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:32 rt=1695281432816 request=/UnityPlayer.dll requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5c8f0-31fd066b cn2=43602 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=36.169.171.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 43602, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/UnityPlayer.dll", "localhostname": "WAFirewall", "localstarttime": "1695281432816 ", "message": "<185>Sep 21 02:30:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.244.182.40 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=36.169.171.55 spt=43602 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Sep 21 2023 02:30:32 rt=1695281432816 request=/UnityPlayer.dll requestClientApplication=\"'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'\" dvchost=WAFirewall externalId=18ab6a5c8f0-31fd066b cn2=43602 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=36.169.171.55 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:43.158.218.124", "barracuda_waf_GEO_IP_BLOCK" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "36.169.171.55", "serverIP": "230.244.182.40", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 21 02:30:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.244.182.40 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=36.169.171.55 spt=43602 requestMethod=GET app=TLSv1.2 requestContext="-" start=Sep 21 2023 02:30:32 rt=1695281432816 request=/UnityPlayer.dll requestClientApplication="'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0'" dvchost=WAFirewall externalId=18ab6a5c8f0-31fd066b cn2=43602 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=36.169.171.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message