input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<185>Sep 8 21:58:14 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=38.102.223.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.20.143.245 spt=46964 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:14 rt=1694228294223 request=/crm/javascript:document.forms%5B%27LoginForm%27%5D.action\=%27/servlet/eAndar.PreLogin%27;%20document.forms%5B%27LoginForm%27%5D.NavigationButton.value\=%27Forgot%27;document.forms%5B%27LoginForm%27%5D.submit%28%29; requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02a4f-1cd2825a cn2=46964 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.20.143.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 46964, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/crm/javascript:document.forms%5B%27LoginForm%27%5D.action\\=%27/servlet/eAndar.PreLogin%27;%20document.forms%5B%27LoginForm%27%5D.NavigationButton.value\\=%27Forgot%27;document.forms%5B%27LoginForm%27%5D.submit%28%29;", "localhostname": "WAFirewall", "localstarttime": "1694228294223 ", "message": "<185>Sep 8 21:58:14 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=38.102.223.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=169.20.143.245 spt=46964 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:14 rt=1694228294223 request=/crm/javascript:document.forms%5B%27LoginForm%27%5D.action\\=%27/servlet/eAndar.PreLogin%27;%20document.forms%5B%27LoginForm%27%5D.NavigationButton.value\\=%27Forgot%27;document.forms%5B%27LoginForm%27%5D.submit%28%29; requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02a4f-1cd2825a cn2=46964 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.20.143.245 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "169.20.143.245", "serverIP": "38.102.223.192", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:14 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=38.102.223.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.20.143.245 spt=46964 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:14 rt=1694228294223 request=/crm/javascript:document.forms%5B%27LoginForm%27%5D.action\=%27/servlet/eAndar.PreLogin%27;%20document.forms%5B%27LoginForm%27%5D.NavigationButton.value\=%27Forgot%27;document.forms%5B%27LoginForm%27%5D.submit%28%29; requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02a4f-1cd2825a cn2=46964 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.20.143.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:14 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=38.102.223.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.20.143.245 spt=46964 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:14 rt=1694228294223 request=/crm/javascript:document.forms%5B%27LoginForm%27%5D.action\=%27/servlet/eAndar.PreLogin%27;%20document.forms%5B%27LoginForm%27%5D.NavigationButton.value\=%27Forgot%27;document.forms%5B%27LoginForm%27%5D.submit%28%29; requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02a4f-1cd2825a cn2=46964 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.20.143.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 46964 facilitycode: 23 facilitylabel: local7 fqdn: /crm/javascript:document.forms%5B%27LoginForm%27%5D.action\=%27/servlet/eAndar.PreLogin%27;%20document.forms%5B%27LoginForm%27%5D.NavigationButton.value\=%27Forgot%27;document.forms%5B%27LoginForm%27%5D.submit%28%29; localhostname: WAFirewall localstarttime: 1694228294223 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 169.20.143.245 serverIP: 38.102.223.192 userName: -
Explain this syslog message
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.159.65.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=193.208.190.23 spt=44535 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289213 request=/give requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e016bd-18c561df cn2=44535 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=193.208.190.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 44535, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/give", "localhostname": "WAFirewall", "localstarttime": "1694228289213 ", "message": "<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.159.65.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=193.208.190.23 spt=44535 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:09 rt=1694228289213 request=/give requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e016bd-18c561df cn2=44535 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=193.208.190.23 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "193.208.190.23", "serverIP": "130.159.65.96", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.159.65.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=193.208.190.23 spt=44535 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289213 request=/give requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e016bd-18c561df cn2=44535 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=193.208.190.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.159.65.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=193.208.190.23 spt=44535 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289213 request=/give requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e016bd-18c561df cn2=44535 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=193.208.190.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 44535 facilitycode: 23 facilitylabel: local7 fqdn: /give localhostname: WAFirewall localstarttime: 1694228289213 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 193.208.190.23 serverIP: 130.159.65.96 userName: -
Explain this syslog message
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.189.36.18 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=50.145.247.213 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=50.145.247.213 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 48029, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/bggeneral", "localhostname": "WAFirewall", "localstarttime": "1694228296588 ", "message": "<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.189.36.18 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=50.145.247.213 spt=48029 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=50.145.247.213 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "50.145.247.213", "serverIP": "230.189.36.18", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.189.36.18 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=50.145.247.213 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=50.145.247.213 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.189.36.18 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=50.145.247.213 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=50.145.247.213 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 48029 facilitycode: 23 facilitylabel: local7 fqdn: /bggeneral localhostname: WAFirewall localstarttime: 1694228296588 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 50.145.247.213 serverIP: 230.189.36.18 userName: -
Explain this syslog message
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.67.126.23 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=135.218.238.68 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=135.218.238.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 48029, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/bggeneral", "localhostname": "WAFirewall", "localstarttime": "1694228296588 ", "message": "<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.67.126.23 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=135.218.238.68 spt=48029 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=135.218.238.68 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "135.218.238.68", "serverIP": "34.67.126.23", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.67.126.23 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=135.218.238.68 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=135.218.238.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.67.126.23 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=135.218.238.68 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=135.218.238.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 48029 facilitycode: 23 facilitylabel: local7 fqdn: /bggeneral localhostname: WAFirewall localstarttime: 1694228296588 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 135.218.238.68 serverIP: 34.67.126.23 userName: -
Explain this syslog message
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=70.193.95.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=73.247.166.14 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=73.247.166.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 48029, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/bggeneral", "localhostname": "WAFirewall", "localstarttime": "1694228296588 ", "message": "<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=70.193.95.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=73.247.166.14 spt=48029 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=73.247.166.14 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "73.247.166.14", "serverIP": "70.193.95.97", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=70.193.95.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=73.247.166.14 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=73.247.166.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=70.193.95.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=73.247.166.14 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=73.247.166.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 48029 facilitycode: 23 facilitylabel: local7 fqdn: /bggeneral localhostname: WAFirewall localstarttime: 1694228296588 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 73.247.166.14 serverIP: 70.193.95.97 userName: -
Explain this syslog message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.252.118.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=227.108.182.127 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.108.182.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 46228, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/MLSubscribe.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228292719 ", "message": "<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.252.118.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=227.108.182.127 spt=46228 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.108.182.127 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "227.108.182.127", "serverIP": "134.252.118.97", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.252.118.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=227.108.182.127 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.108.182.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.252.118.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=227.108.182.127 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.108.182.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 46228 facilitycode: 23 facilitylabel: local7 fqdn: /comm/MLSubscribe.jsp localhostname: WAFirewall localstarttime: 1694228292719 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 227.108.182.127 serverIP: 134.252.118.97 userName: -
Explain this syslog message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.130.254.220 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=23.125.163.206 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=23.125.163.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 46228, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/MLSubscribe.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228292719 ", "message": "<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.130.254.220 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=23.125.163.206 spt=46228 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=23.125.163.206 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "23.125.163.206", "serverIP": "60.130.254.220", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.130.254.220 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=23.125.163.206 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=23.125.163.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.130.254.220 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=23.125.163.206 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=23.125.163.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 46228 facilitycode: 23 facilitylabel: local7 fqdn: /comm/MLSubscribe.jsp localhostname: WAFirewall localstarttime: 1694228292719 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 23.125.163.206 serverIP: 60.130.254.220 userName: -
Explain this syslog message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.113.140.160 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=127.207.3.180 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=127.207.3.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 46228, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/MLSubscribe.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228292719 ", "message": "<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.113.140.160 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=127.207.3.180 spt=46228 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=127.207.3.180 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "127.207.3.180", "serverIP": "87.113.140.160", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.113.140.160 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=127.207.3.180 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=127.207.3.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.113.140.160 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=127.207.3.180 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=127.207.3.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 46228 facilitycode: 23 facilitylabel: local7 fqdn: /comm/MLSubscribe.jsp localhostname: WAFirewall localstarttime: 1694228292719 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 127.207.3.180 serverIP: 87.113.140.160 userName: -
Explain this syslog message
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.24.112.100 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.14.193.128 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.14.193.128 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 44829, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/crm/Start.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228289685 ", "message": "<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.24.112.100 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=122.14.193.128 spt=44829 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.14.193.128 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "122.14.193.128", "serverIP": "189.24.112.100", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.24.112.100 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.14.193.128 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.14.193.128 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.24.112.100 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.14.193.128 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.14.193.128 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 44829 facilitycode: 23 facilitylabel: local7 fqdn: /crm/Start.jsp localhostname: WAFirewall localstarttime: 1694228289685 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 122.14.193.128 serverIP: 189.24.112.100 userName: -
Explain this syslog message
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.44.12.203 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=33.203.64.228 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.203.64.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 44829, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/crm/Start.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228289685 ", "message": "<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.44.12.203 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=33.203.64.228 spt=44829 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.203.64.228 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "33.203.64.228", "serverIP": "130.44.12.203", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.44.12.203 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=33.203.64.228 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.203.64.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.44.12.203 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=33.203.64.228 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.203.64.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 44829 facilitycode: 23 facilitylabel: local7 fqdn: /crm/Start.jsp localhostname: WAFirewall localstarttime: 1694228289685 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 33.203.64.228 serverIP: 130.44.12.203 userName: -
Explain this syslog message
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.167.128.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.5.209.37 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.5.209.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 44829, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/crm/Start.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228289685 ", "message": "<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.167.128.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=65.5.209.37 spt=44829 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.5.209.37 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "65.5.209.37", "serverIP": "73.167.128.66", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.167.128.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.5.209.37 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.5.209.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.167.128.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.5.209.37 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.5.209.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 44829 facilitycode: 23 facilitylabel: local7 fqdn: /crm/Start.jsp localhostname: WAFirewall localstarttime: 1694228289685 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 65.5.209.37 serverIP: 73.167.128.66 userName: -
Explain this syslog message
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.135.55.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.20.177.20 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.20.177.20 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 46519, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/crm/", "localhostname": "WAFirewall", "localstarttime": "1694228293225 ", "message": "<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.135.55.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=10.20.177.20 spt=46519 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.20.177.20 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "10.20.177.20", "serverIP": "40.135.55.234", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.135.55.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.20.177.20 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.20.177.20 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.135.55.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.20.177.20 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.20.177.20 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 46519 facilitycode: 23 facilitylabel: local7 fqdn: /crm/ localhostname: WAFirewall localstarttime: 1694228293225 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 10.20.177.20 serverIP: 40.135.55.234 userName: -
Explain this syslog message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.238.145.84 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=129.144.231.107 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=129.144.231.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45977, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/SinglePageRegPledge.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228292120 ", "message": "<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.238.145.84 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=129.144.231.107 spt=45977 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=129.144.231.107 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "129.144.231.107", "serverIP": "133.238.145.84", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.238.145.84 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=129.144.231.107 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=129.144.231.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.238.145.84 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=129.144.231.107 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=129.144.231.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45977 facilitycode: 23 facilitylabel: local7 fqdn: /comm/SinglePageRegPledge.jsp localhostname: WAFirewall localstarttime: 1694228292120 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 129.144.231.107 serverIP: 133.238.145.84 userName: -
Explain this syslog message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.42.142.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=156.95.222.110 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/umbrellasub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.95.222.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 44328, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/uwcasub", "localhostname": "WAFirewall", "localstarttime": "1694228288731 ", "message": "<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.42.142.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=156.95.222.110 spt=44328 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/umbrellasub requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.95.222.110 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "156.95.222.110", "serverIP": "79.42.142.96", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.42.142.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=156.95.222.110 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/umbrellasub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.95.222.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.42.142.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=156.95.222.110 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/umbrellasub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.95.222.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 44328 facilitycode: 23 facilitylabel: local7 fqdn: /uwcasub localhostname: WAFirewall localstarttime: 1694228288731 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 156.95.222.110 serverIP: 79.42.142.96 userName: -
Explain this syslog message
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.21.58.225 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.216.2.109 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.216.2.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 46519, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/crm/", "localhostname": "WAFirewall", "localstarttime": "1694228293225 ", "message": "<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.21.58.225 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=97.216.2.109 spt=46519 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.216.2.109 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "97.216.2.109", "serverIP": "232.21.58.225", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.21.58.225 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.216.2.109 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.216.2.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.21.58.225 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.216.2.109 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.216.2.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 46519 facilitycode: 23 facilitylabel: local7 fqdn: /crm/ localhostname: WAFirewall localstarttime: 1694228293225 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 97.216.2.109 serverIP: 232.21.58.225 userName: -
Explain this syslog message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.53.170.59 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.227.76.75 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.227.76.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45977, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/SinglePageRegPledge.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228292120 ", "message": "<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.53.170.59 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=204.227.76.75 spt=45977 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.227.76.75 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "204.227.76.75", "serverIP": "220.53.170.59", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.53.170.59 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.227.76.75 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.227.76.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.53.170.59 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.227.76.75 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.227.76.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45977 facilitycode: 23 facilitylabel: local7 fqdn: /comm/SinglePageRegPledge.jsp localhostname: WAFirewall localstarttime: 1694228292120 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 204.227.76.75 serverIP: 220.53.170.59 userName: -
Explain this syslog message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=5.143.26.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=198.100.53.45 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/acmesub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=198.100.53.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 44328, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/uwcasub", "localhostname": "WAFirewall", "localstarttime": "1694228288731 ", "message": "<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=5.143.26.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=198.100.53.45 spt=44328 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/acmesub requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=198.100.53.45 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "198.100.53.45", "serverIP": "5.143.26.80", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=5.143.26.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=198.100.53.45 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/acmesub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=198.100.53.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=5.143.26.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=198.100.53.45 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/acmesub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=198.100.53.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 44328 facilitycode: 23 facilitylabel: local7 fqdn: /uwcasub localhostname: WAFirewall localstarttime: 1694228288731 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 198.100.53.45 serverIP: 5.143.26.80 userName: -
Explain this syslog message
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.175.242.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=232.233.120.93 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=232.233.120.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 46519, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/crm/", "localhostname": "WAFirewall", "localstarttime": "1694228293225 ", "message": "<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.175.242.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=232.233.120.93 spt=46519 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=232.233.120.93 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "232.233.120.93", "serverIP": "189.175.242.207", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.175.242.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=232.233.120.93 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=232.233.120.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.175.242.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=232.233.120.93 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=232.233.120.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 46519 facilitycode: 23 facilitylabel: local7 fqdn: /crm/ localhostname: WAFirewall localstarttime: 1694228293225 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 232.233.120.93 serverIP: 189.175.242.207 userName: -
Explain this syslog message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=197.2.119.35 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.57.203.64 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.57.203.64 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45977, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/SinglePageRegPledge.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228292120 ", "message": "<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=197.2.119.35 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=79.57.203.64 spt=45977 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.57.203.64 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "79.57.203.64", "serverIP": "197.2.119.35", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=197.2.119.35 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.57.203.64 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.57.203.64 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=197.2.119.35 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.57.203.64 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.57.203.64 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45977 facilitycode: 23 facilitylabel: local7 fqdn: /comm/SinglePageRegPledge.jsp localhostname: WAFirewall localstarttime: 1694228292120 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 79.57.203.64 serverIP: 197.2.119.35 userName: -
Explain this syslog message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=30.133.122.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.30.83.138 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/oscorpsub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.30.83.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 44328, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/uwcasub", "localhostname": "WAFirewall", "localstarttime": "1694228288731 ", "message": "<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=30.133.122.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=159.30.83.138 spt=44328 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/oscorpsub requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.30.83.138 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "159.30.83.138", "serverIP": "30.133.122.3", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=30.133.122.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.30.83.138 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/oscorpsub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.30.83.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=30.133.122.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.30.83.138 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/oscorpsub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.30.83.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 44328 facilitycode: 23 facilitylabel: local7 fqdn: /uwcasub localhostname: WAFirewall localstarttime: 1694228288731 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 159.30.83.138 serverIP: 30.133.122.3 userName: -
Explain this syslog message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.248.78.76 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=108.97.39.219 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.97.39.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 48376, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/SinglePageRegPledge.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228297655 ", "message": "<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.248.78.76 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=108.97.39.219 spt=48376 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.97.39.219 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "108.97.39.219", "serverIP": "162.248.78.76", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.248.78.76 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=108.97.39.219 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.97.39.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.248.78.76 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=108.97.39.219 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.97.39.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 48376 facilitycode: 23 facilitylabel: local7 fqdn: /comm/SinglePageRegPledge.jsp localhostname: WAFirewall localstarttime: 1694228297655 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 108.97.39.219 serverIP: 162.248.78.76 userName: -
Explain this syslog message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.14.233.109 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=234.123.42.189 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.123.42.189 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 48221, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/SinglePageRegPledge.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228297053 ", "message": "<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.14.233.109 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=234.123.42.189 spt=48221 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.123.42.189 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "234.123.42.189", "serverIP": "68.14.233.109", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.14.233.109 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=234.123.42.189 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.123.42.189 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.14.233.109 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=234.123.42.189 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.123.42.189 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 48221 facilitycode: 23 facilitylabel: local7 fqdn: /comm/SinglePageRegPledge.jsp localhostname: WAFirewall localstarttime: 1694228297053 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 234.123.42.189 serverIP: 68.14.233.109 userName: -
Explain this syslog message
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.4.251.149 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=32.110.114.14 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=32.110.114.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45268, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/MLSubscribe.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228290627 ", "message": "<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.4.251.149 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=32.110.114.14 spt=45268 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=32.110.114.14 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "32.110.114.14", "serverIP": "159.4.251.149", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.4.251.149 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=32.110.114.14 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=32.110.114.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.4.251.149 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=32.110.114.14 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=32.110.114.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45268 facilitycode: 23 facilitylabel: local7 fqdn: /comm/MLSubscribe.jsp localhostname: WAFirewall localstarttime: 1694228290627 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 32.110.114.14 serverIP: 159.4.251.149 userName: -
Explain this syslog message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=210.33.72.133 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=174.77.174.236 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.77.174.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 48376, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/SinglePageRegPledge.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228297655 ", "message": "<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=210.33.72.133 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=174.77.174.236 spt=48376 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.77.174.236 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "174.77.174.236", "serverIP": "210.33.72.133", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=210.33.72.133 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=174.77.174.236 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.77.174.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=210.33.72.133 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=174.77.174.236 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.77.174.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 48376 facilitycode: 23 facilitylabel: local7 fqdn: /comm/SinglePageRegPledge.jsp localhostname: WAFirewall localstarttime: 1694228297655 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 174.77.174.236 serverIP: 210.33.72.133 userName: -
Explain this syslog message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.34.60.170 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.190.92.79 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.190.92.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 48221, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/SinglePageRegPledge.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228297053 ", "message": "<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.34.60.170 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=248.190.92.79 spt=48221 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.190.92.79 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "248.190.92.79", "serverIP": "218.34.60.170", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.34.60.170 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.190.92.79 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.190.92.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.34.60.170 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.190.92.79 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.190.92.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 48221 facilitycode: 23 facilitylabel: local7 fqdn: /comm/SinglePageRegPledge.jsp localhostname: WAFirewall localstarttime: 1694228297053 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 248.190.92.79 serverIP: 218.34.60.170 userName: -
Explain this syslog message
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.172.144.71 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.8.65.132 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.8.65.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45268, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/MLSubscribe.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228290627 ", "message": "<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.172.144.71 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=191.8.65.132 spt=45268 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.8.65.132 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "191.8.65.132", "serverIP": "147.172.144.71", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.172.144.71 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.8.65.132 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.8.65.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.172.144.71 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.8.65.132 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.8.65.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45268 facilitycode: 23 facilitylabel: local7 fqdn: /comm/MLSubscribe.jsp localhostname: WAFirewall localstarttime: 1694228290627 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 191.8.65.132 serverIP: 147.172.144.71 userName: -
Explain this syslog message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=143.18.165.132 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=177.65.115.194 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.65.115.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 48376, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/SinglePageRegPledge.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228297655 ", "message": "<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=143.18.165.132 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=177.65.115.194 spt=48376 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.65.115.194 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "177.65.115.194", "serverIP": "143.18.165.132", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=143.18.165.132 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=177.65.115.194 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.65.115.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=143.18.165.132 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=177.65.115.194 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.65.115.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 48376 facilitycode: 23 facilitylabel: local7 fqdn: /comm/SinglePageRegPledge.jsp localhostname: WAFirewall localstarttime: 1694228297655 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 177.65.115.194 serverIP: 143.18.165.132 userName: -
Explain this syslog message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.193.170.247 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=42.222.166.0 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=42.222.166.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 48221, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/SinglePageRegPledge.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228297053 ", "message": "<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.193.170.247 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=42.222.166.0 spt=48221 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=42.222.166.0 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "42.222.166.0", "serverIP": "230.193.170.247", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.193.170.247 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=42.222.166.0 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=42.222.166.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.193.170.247 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=42.222.166.0 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=42.222.166.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 48221 facilitycode: 23 facilitylabel: local7 fqdn: /comm/SinglePageRegPledge.jsp localhostname: WAFirewall localstarttime: 1694228297053 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 42.222.166.0 serverIP: 230.193.170.247 userName: -
Explain this syslog message
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=139.236.47.142 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.87.33.131 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.87.33.131 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45268, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comm/MLSubscribe.jsp", "localhostname": "WAFirewall", "localstarttime": "1694228290627 ", "message": "<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=139.236.47.142 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=151.87.33.131 spt=45268 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.87.33.131 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "151.87.33.131", "serverIP": "139.236.47.142", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=139.236.47.142 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.87.33.131 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.87.33.131 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=139.236.47.142 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.87.33.131 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.87.33.131 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45268 facilitycode: 23 facilitylabel: local7 fqdn: /comm/MLSubscribe.jsp localhostname: WAFirewall localstarttime: 1694228290627 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 151.87.33.131 serverIP: 139.236.47.142 userName: -
Explain this syslog message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=195.83.6.194 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=215.20.159.170 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=215.20.159.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 44133, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/tornado", "localhostname": "WAFirewall", "localstarttime": "1694228288221 ", "message": "<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=195.83.6.194 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=215.20.159.170 spt=44133 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=215.20.159.170 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "215.20.159.170", "serverIP": "195.83.6.194", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=195.83.6.194 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=215.20.159.170 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=215.20.159.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=195.83.6.194 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=215.20.159.170 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=215.20.159.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 44133 facilitycode: 23 facilitylabel: local7 fqdn: /tornado localhostname: WAFirewall localstarttime: 1694228288221 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 215.20.159.170 serverIP: 195.83.6.194 userName: -
Explain this syslog message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.164.246.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.243.134.77 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.243.134.77 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 44133, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/tornado", "localhostname": "WAFirewall", "localstarttime": "1694228288221 ", "message": "<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.164.246.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=255.243.134.77 spt=44133 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.243.134.77 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "255.243.134.77", "serverIP": "42.164.246.241", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.164.246.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.243.134.77 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.243.134.77 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.164.246.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.243.134.77 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.243.134.77 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 44133 facilitycode: 23 facilitylabel: local7 fqdn: /tornado localhostname: WAFirewall localstarttime: 1694228288221 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 255.243.134.77 serverIP: 42.164.246.241 userName: -
Explain this syslog message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=118.0.220.205 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=29.68.133.135 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.68.133.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 44133, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/tornado", "localhostname": "WAFirewall", "localstarttime": "1694228288221 ", "message": "<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=118.0.220.205 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=29.68.133.135 spt=44133 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.68.133.135 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "29.68.133.135", "serverIP": "118.0.220.205", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=118.0.220.205 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=29.68.133.135 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.68.133.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=118.0.220.205 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=29.68.133.135 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.68.133.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 44133 facilitycode: 23 facilitylabel: local7 fqdn: /tornado localhostname: WAFirewall localstarttime: 1694228288221 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 29.68.133.135 serverIP: 118.0.220.205 userName: -
Explain this syslog message
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.52.127.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=132.40.22.243 spt=45107 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=132.40.22.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45107, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/hud", "localhostname": "WAFirewall", "localstarttime": "1694228290159 ", "message": "<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.52.127.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=132.40.22.243 spt=45107 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=132.40.22.243 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "132.40.22.243", "serverIP": "180.52.127.21", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.52.127.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=132.40.22.243 spt=45107 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=132.40.22.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.52.127.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=132.40.22.243 spt=45107 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=132.40.22.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45107 facilitycode: 23 facilitylabel: local7 fqdn: /hud localhostname: WAFirewall localstarttime: 1694228290159 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 132.40.22.243 serverIP: 180.52.127.21 userName: -
Explain this syslog message
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.18.211.86 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.218.237.173 spt=45107 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.218.237.173 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45107, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/hud", "localhostname": "WAFirewall", "localstarttime": "1694228290159 ", "message": "<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.18.211.86 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=21.218.237.173 spt=45107 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.218.237.173 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "ProxyIP:185.185.217.76", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "21.218.237.173", "serverIP": "156.18.211.86", "userName": "-" }
Create a JSON artifact from the message