input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Sep 8 21:58:14 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=38.102.223.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.20.143.245 spt=46964 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:14 rt=1694228294223 request=/crm/javascript:document.forms%5B%27LoginForm%27%5D.action\=%27/servlet/eAndar.PreLogin%27;%20document.forms%5B%27LoginForm%27%5D.NavigationButton.value\=%27Forgot%27;document.forms%5B%27LoginForm%27%5D.submit%28%29; requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02a4f-1cd2825a cn2=46964 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.20.143.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 46964,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/crm/javascript:document.forms%5B%27LoginForm%27%5D.action\\=%27/servlet/eAndar.PreLogin%27;%20document.forms%5B%27LoginForm%27%5D.NavigationButton.value\\=%27Forgot%27;document.forms%5B%27LoginForm%27%5D.submit%28%29;",
"localhostname": "WAFirewall",
"localstarttime": "1694228294223 ",
"message": "<185>Sep 8 21:58:14 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=38.102.223.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=169.20.143.245 spt=46964 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:14 rt=1694228294223 request=/crm/javascript:document.forms%5B%27LoginForm%27%5D.action\\=%27/servlet/eAndar.PreLogin%27;%20document.forms%5B%27LoginForm%27%5D.NavigationButton.value\\=%27Forgot%27;document.forms%5B%27LoginForm%27%5D.submit%28%29; requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02a4f-1cd2825a cn2=46964 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.20.143.245 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "169.20.143.245",
"serverIP": "38.102.223.192",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:14 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=38.102.223.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.20.143.245 spt=46964 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:14 rt=1694228294223 request=/crm/javascript:document.forms%5B%27LoginForm%27%5D.action\=%27/servlet/eAndar.PreLogin%27;%20document.forms%5B%27LoginForm%27%5D.NavigationButton.value\=%27Forgot%27;document.forms%5B%27LoginForm%27%5D.submit%28%29; requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02a4f-1cd2825a cn2=46964 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.20.143.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:14 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=38.102.223.192 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.20.143.245 spt=46964 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:14 rt=1694228294223 request=/crm/javascript:document.forms%5B%27LoginForm%27%5D.action\=%27/servlet/eAndar.PreLogin%27;%20document.forms%5B%27LoginForm%27%5D.NavigationButton.value\=%27Forgot%27;document.forms%5B%27LoginForm%27%5D.submit%28%29; requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02a4f-1cd2825a cn2=46964 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.20.143.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46964
facilitycode: 23
facilitylabel: local7
fqdn: /crm/javascript:document.forms%5B%27LoginForm%27%5D.action\=%27/servlet/eAndar.PreLogin%27;%20document.forms%5B%27LoginForm%27%5D.NavigationButton.value\=%27Forgot%27;document.forms%5B%27LoginForm%27%5D.submit%28%29;
localhostname: WAFirewall
localstarttime: 1694228294223
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 169.20.143.245
serverIP: 38.102.223.192
userName: - | Explain this syslog message |
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.159.65.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=193.208.190.23 spt=44535 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289213 request=/give requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e016bd-18c561df cn2=44535 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=193.208.190.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44535,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/give",
"localhostname": "WAFirewall",
"localstarttime": "1694228289213 ",
"message": "<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.159.65.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=193.208.190.23 spt=44535 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:09 rt=1694228289213 request=/give requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e016bd-18c561df cn2=44535 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=193.208.190.23 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "193.208.190.23",
"serverIP": "130.159.65.96",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.159.65.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=193.208.190.23 spt=44535 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289213 request=/give requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e016bd-18c561df cn2=44535 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=193.208.190.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.159.65.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=193.208.190.23 spt=44535 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289213 request=/give requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e016bd-18c561df cn2=44535 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=193.208.190.23 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44535
facilitycode: 23
facilitylabel: local7
fqdn: /give
localhostname: WAFirewall
localstarttime: 1694228289213
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 193.208.190.23
serverIP: 130.159.65.96
userName: - | Explain this syslog message |
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.189.36.18 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=50.145.247.213 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=50.145.247.213 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48029,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/bggeneral",
"localhostname": "WAFirewall",
"localstarttime": "1694228296588 ",
"message": "<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.189.36.18 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=50.145.247.213 spt=48029 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=50.145.247.213 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "50.145.247.213",
"serverIP": "230.189.36.18",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.189.36.18 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=50.145.247.213 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=50.145.247.213 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.189.36.18 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=50.145.247.213 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=50.145.247.213 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48029
facilitycode: 23
facilitylabel: local7
fqdn: /bggeneral
localhostname: WAFirewall
localstarttime: 1694228296588
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 50.145.247.213
serverIP: 230.189.36.18
userName: - | Explain this syslog message |
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.67.126.23 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=135.218.238.68 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=135.218.238.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48029,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/bggeneral",
"localhostname": "WAFirewall",
"localstarttime": "1694228296588 ",
"message": "<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.67.126.23 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=135.218.238.68 spt=48029 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=135.218.238.68 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "135.218.238.68",
"serverIP": "34.67.126.23",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.67.126.23 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=135.218.238.68 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=135.218.238.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.67.126.23 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=135.218.238.68 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=135.218.238.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48029
facilitycode: 23
facilitylabel: local7
fqdn: /bggeneral
localhostname: WAFirewall
localstarttime: 1694228296588
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 135.218.238.68
serverIP: 34.67.126.23
userName: - | Explain this syslog message |
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=70.193.95.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=73.247.166.14 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=73.247.166.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48029,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/bggeneral",
"localhostname": "WAFirewall",
"localstarttime": "1694228296588 ",
"message": "<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=70.193.95.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=73.247.166.14 spt=48029 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=73.247.166.14 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "73.247.166.14",
"serverIP": "70.193.95.97",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=70.193.95.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=73.247.166.14 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=73.247.166.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=70.193.95.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=73.247.166.14 spt=48029 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:16 rt=1694228296588 request=/bggeneral requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0338c-19c96600 cn2=48029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=73.247.166.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48029
facilitycode: 23
facilitylabel: local7
fqdn: /bggeneral
localhostname: WAFirewall
localstarttime: 1694228296588
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 73.247.166.14
serverIP: 70.193.95.97
userName: - | Explain this syslog message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.252.118.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=227.108.182.127 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.108.182.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 46228,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/MLSubscribe.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228292719 ",
"message": "<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.252.118.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=227.108.182.127 spt=46228 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.108.182.127 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "227.108.182.127",
"serverIP": "134.252.118.97",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.252.118.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=227.108.182.127 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.108.182.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.252.118.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=227.108.182.127 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.108.182.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46228
facilitycode: 23
facilitylabel: local7
fqdn: /comm/MLSubscribe.jsp
localhostname: WAFirewall
localstarttime: 1694228292719
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 227.108.182.127
serverIP: 134.252.118.97
userName: - | Explain this syslog message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.130.254.220 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=23.125.163.206 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=23.125.163.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 46228,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/MLSubscribe.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228292719 ",
"message": "<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.130.254.220 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=23.125.163.206 spt=46228 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=23.125.163.206 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "23.125.163.206",
"serverIP": "60.130.254.220",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.130.254.220 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=23.125.163.206 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=23.125.163.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.130.254.220 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=23.125.163.206 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=23.125.163.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46228
facilitycode: 23
facilitylabel: local7
fqdn: /comm/MLSubscribe.jsp
localhostname: WAFirewall
localstarttime: 1694228292719
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 23.125.163.206
serverIP: 60.130.254.220
userName: - | Explain this syslog message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.113.140.160 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=127.207.3.180 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=127.207.3.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 46228,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/MLSubscribe.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228292719 ",
"message": "<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.113.140.160 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=127.207.3.180 spt=46228 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=127.207.3.180 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "127.207.3.180",
"serverIP": "87.113.140.160",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.113.140.160 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=127.207.3.180 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=127.207.3.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.113.140.160 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=127.207.3.180 spt=46228 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292719 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0246f-14d03447 cn2=46228 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=127.207.3.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46228
facilitycode: 23
facilitylabel: local7
fqdn: /comm/MLSubscribe.jsp
localhostname: WAFirewall
localstarttime: 1694228292719
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 127.207.3.180
serverIP: 87.113.140.160
userName: - | Explain this syslog message |
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.24.112.100 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.14.193.128 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.14.193.128 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44829,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/crm/Start.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228289685 ",
"message": "<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.24.112.100 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=122.14.193.128 spt=44829 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.14.193.128 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "122.14.193.128",
"serverIP": "189.24.112.100",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.24.112.100 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.14.193.128 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.14.193.128 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.24.112.100 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.14.193.128 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.14.193.128 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44829
facilitycode: 23
facilitylabel: local7
fqdn: /crm/Start.jsp
localhostname: WAFirewall
localstarttime: 1694228289685
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 122.14.193.128
serverIP: 189.24.112.100
userName: - | Explain this syslog message |
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.44.12.203 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=33.203.64.228 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.203.64.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44829,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/crm/Start.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228289685 ",
"message": "<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.44.12.203 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=33.203.64.228 spt=44829 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.203.64.228 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "33.203.64.228",
"serverIP": "130.44.12.203",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.44.12.203 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=33.203.64.228 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.203.64.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=130.44.12.203 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=33.203.64.228 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.203.64.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44829
facilitycode: 23
facilitylabel: local7
fqdn: /crm/Start.jsp
localhostname: WAFirewall
localstarttime: 1694228289685
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 33.203.64.228
serverIP: 130.44.12.203
userName: - | Explain this syslog message |
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.167.128.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.5.209.37 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.5.209.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44829,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/crm/Start.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228289685 ",
"message": "<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.167.128.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=65.5.209.37 spt=44829 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.5.209.37 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "65.5.209.37",
"serverIP": "73.167.128.66",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.167.128.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.5.209.37 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.5.209.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.167.128.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.5.209.37 spt=44829 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:09 rt=1694228289685 request=/crm/Start.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01895-17acd888 cn2=44829 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.5.209.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44829
facilitycode: 23
facilitylabel: local7
fqdn: /crm/Start.jsp
localhostname: WAFirewall
localstarttime: 1694228289685
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 65.5.209.37
serverIP: 73.167.128.66
userName: - | Explain this syslog message |
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.135.55.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.20.177.20 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.20.177.20 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 46519,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/crm/",
"localhostname": "WAFirewall",
"localstarttime": "1694228293225 ",
"message": "<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.135.55.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=10.20.177.20 spt=46519 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.20.177.20 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "10.20.177.20",
"serverIP": "40.135.55.234",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.135.55.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.20.177.20 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.20.177.20 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.135.55.234 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.20.177.20 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.20.177.20 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46519
facilitycode: 23
facilitylabel: local7
fqdn: /crm/
localhostname: WAFirewall
localstarttime: 1694228293225
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 10.20.177.20
serverIP: 40.135.55.234
userName: - | Explain this syslog message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.238.145.84 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=129.144.231.107 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=129.144.231.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45977,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228292120 ",
"message": "<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.238.145.84 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=129.144.231.107 spt=45977 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=129.144.231.107 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "129.144.231.107",
"serverIP": "133.238.145.84",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.238.145.84 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=129.144.231.107 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=129.144.231.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.238.145.84 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=129.144.231.107 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=129.144.231.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45977
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1694228292120
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 129.144.231.107
serverIP: 133.238.145.84
userName: - | Explain this syslog message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.42.142.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=156.95.222.110 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/umbrellasub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.95.222.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44328,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/uwcasub",
"localhostname": "WAFirewall",
"localstarttime": "1694228288731 ",
"message": "<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.42.142.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=156.95.222.110 spt=44328 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/umbrellasub requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.95.222.110 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "156.95.222.110",
"serverIP": "79.42.142.96",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.42.142.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=156.95.222.110 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/umbrellasub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.95.222.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.42.142.96 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=156.95.222.110 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/umbrellasub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=156.95.222.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44328
facilitycode: 23
facilitylabel: local7
fqdn: /uwcasub
localhostname: WAFirewall
localstarttime: 1694228288731
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 156.95.222.110
serverIP: 79.42.142.96
userName: - | Explain this syslog message |
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.21.58.225 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.216.2.109 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.216.2.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 46519,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/crm/",
"localhostname": "WAFirewall",
"localstarttime": "1694228293225 ",
"message": "<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.21.58.225 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=97.216.2.109 spt=46519 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.216.2.109 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "97.216.2.109",
"serverIP": "232.21.58.225",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.21.58.225 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.216.2.109 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.216.2.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.21.58.225 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.216.2.109 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.216.2.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46519
facilitycode: 23
facilitylabel: local7
fqdn: /crm/
localhostname: WAFirewall
localstarttime: 1694228293225
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 97.216.2.109
serverIP: 232.21.58.225
userName: - | Explain this syslog message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.53.170.59 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.227.76.75 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.227.76.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45977,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228292120 ",
"message": "<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.53.170.59 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=204.227.76.75 spt=45977 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.227.76.75 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "204.227.76.75",
"serverIP": "220.53.170.59",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.53.170.59 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.227.76.75 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.227.76.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.53.170.59 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.227.76.75 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.227.76.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45977
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1694228292120
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 204.227.76.75
serverIP: 220.53.170.59
userName: - | Explain this syslog message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=5.143.26.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=198.100.53.45 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/acmesub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=198.100.53.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44328,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/uwcasub",
"localhostname": "WAFirewall",
"localstarttime": "1694228288731 ",
"message": "<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=5.143.26.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=198.100.53.45 spt=44328 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/acmesub requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=198.100.53.45 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "198.100.53.45",
"serverIP": "5.143.26.80",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=5.143.26.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=198.100.53.45 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/acmesub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=198.100.53.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=5.143.26.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=198.100.53.45 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/acmesub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=198.100.53.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44328
facilitycode: 23
facilitylabel: local7
fqdn: /uwcasub
localhostname: WAFirewall
localstarttime: 1694228288731
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 198.100.53.45
serverIP: 5.143.26.80
userName: - | Explain this syslog message |
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.175.242.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=232.233.120.93 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=232.233.120.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 46519,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/crm/",
"localhostname": "WAFirewall",
"localstarttime": "1694228293225 ",
"message": "<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.175.242.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=232.233.120.93 spt=46519 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=232.233.120.93 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "232.233.120.93",
"serverIP": "189.175.242.207",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.175.242.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=232.233.120.93 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=232.233.120.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=189.175.242.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=232.233.120.93 spt=46519 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:13 rt=1694228293225 request=/crm/ requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02669-16cb4819 cn2=46519 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=232.233.120.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46519
facilitycode: 23
facilitylabel: local7
fqdn: /crm/
localhostname: WAFirewall
localstarttime: 1694228293225
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 232.233.120.93
serverIP: 189.175.242.207
userName: - | Explain this syslog message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=197.2.119.35 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.57.203.64 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.57.203.64 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45977,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228292120 ",
"message": "<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=197.2.119.35 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=79.57.203.64 spt=45977 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.57.203.64 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "79.57.203.64",
"serverIP": "197.2.119.35",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=197.2.119.35 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.57.203.64 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.57.203.64 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=197.2.119.35 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.57.203.64 spt=45977 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:12 rt=1694228292120 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e02218-22cdf523 cn2=45977 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.57.203.64 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45977
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1694228292120
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 79.57.203.64
serverIP: 197.2.119.35
userName: - | Explain this syslog message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=30.133.122.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.30.83.138 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/oscorpsub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.30.83.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44328,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/uwcasub",
"localhostname": "WAFirewall",
"localstarttime": "1694228288731 ",
"message": "<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=30.133.122.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=159.30.83.138 spt=44328 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/oscorpsub requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.30.83.138 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "159.30.83.138",
"serverIP": "30.133.122.3",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=30.133.122.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.30.83.138 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/oscorpsub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.30.83.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=30.133.122.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.30.83.138 spt=44328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288731 request=/oscorpsub requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e014db-11c318ca cn2=44328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.30.83.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44328
facilitycode: 23
facilitylabel: local7
fqdn: /uwcasub
localhostname: WAFirewall
localstarttime: 1694228288731
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 159.30.83.138
serverIP: 30.133.122.3
userName: - | Explain this syslog message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.248.78.76 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=108.97.39.219 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.97.39.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48376,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228297655 ",
"message": "<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.248.78.76 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=108.97.39.219 spt=48376 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.97.39.219 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "108.97.39.219",
"serverIP": "162.248.78.76",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.248.78.76 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=108.97.39.219 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.97.39.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.248.78.76 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=108.97.39.219 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.97.39.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48376
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1694228297655
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 108.97.39.219
serverIP: 162.248.78.76
userName: - | Explain this syslog message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.14.233.109 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=234.123.42.189 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.123.42.189 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48221,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228297053 ",
"message": "<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.14.233.109 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=234.123.42.189 spt=48221 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.123.42.189 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "234.123.42.189",
"serverIP": "68.14.233.109",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.14.233.109 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=234.123.42.189 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.123.42.189 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.14.233.109 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=234.123.42.189 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.123.42.189 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48221
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1694228297053
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 234.123.42.189
serverIP: 68.14.233.109
userName: - | Explain this syslog message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.4.251.149 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=32.110.114.14 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=32.110.114.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45268,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/MLSubscribe.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228290627 ",
"message": "<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.4.251.149 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=32.110.114.14 spt=45268 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=32.110.114.14 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "32.110.114.14",
"serverIP": "159.4.251.149",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.4.251.149 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=32.110.114.14 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=32.110.114.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.4.251.149 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=32.110.114.14 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=32.110.114.14 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45268
facilitycode: 23
facilitylabel: local7
fqdn: /comm/MLSubscribe.jsp
localhostname: WAFirewall
localstarttime: 1694228290627
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 32.110.114.14
serverIP: 159.4.251.149
userName: - | Explain this syslog message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=210.33.72.133 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=174.77.174.236 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.77.174.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48376,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228297655 ",
"message": "<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=210.33.72.133 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=174.77.174.236 spt=48376 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.77.174.236 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "174.77.174.236",
"serverIP": "210.33.72.133",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=210.33.72.133 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=174.77.174.236 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.77.174.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=210.33.72.133 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=174.77.174.236 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.77.174.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48376
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1694228297655
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 174.77.174.236
serverIP: 210.33.72.133
userName: - | Explain this syslog message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.34.60.170 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.190.92.79 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.190.92.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48221,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228297053 ",
"message": "<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.34.60.170 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=248.190.92.79 spt=48221 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.190.92.79 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "248.190.92.79",
"serverIP": "218.34.60.170",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.34.60.170 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.190.92.79 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.190.92.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.34.60.170 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.190.92.79 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.190.92.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48221
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1694228297053
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 248.190.92.79
serverIP: 218.34.60.170
userName: - | Explain this syslog message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.172.144.71 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.8.65.132 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.8.65.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45268,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/MLSubscribe.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228290627 ",
"message": "<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.172.144.71 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=191.8.65.132 spt=45268 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.8.65.132 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "191.8.65.132",
"serverIP": "147.172.144.71",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.172.144.71 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.8.65.132 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.8.65.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.172.144.71 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.8.65.132 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.8.65.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45268
facilitycode: 23
facilitylabel: local7
fqdn: /comm/MLSubscribe.jsp
localhostname: WAFirewall
localstarttime: 1694228290627
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 191.8.65.132
serverIP: 147.172.144.71
userName: - | Explain this syslog message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=143.18.165.132 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=177.65.115.194 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.65.115.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48376,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228297655 ",
"message": "<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=143.18.165.132 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=177.65.115.194 spt=48376 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.65.115.194 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "177.65.115.194",
"serverIP": "143.18.165.132",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=143.18.165.132 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=177.65.115.194 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.65.115.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=143.18.165.132 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=177.65.115.194 spt=48376 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297655 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e037b7-1bcc7f1e cn2=48376 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.65.115.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48376
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1694228297655
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 177.65.115.194
serverIP: 143.18.165.132
userName: - | Explain this syslog message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.193.170.247 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=42.222.166.0 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=42.222.166.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48221,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228297053 ",
"message": "<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.193.170.247 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=42.222.166.0 spt=48221 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=42.222.166.0 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "42.222.166.0",
"serverIP": "230.193.170.247",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.193.170.247 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=42.222.166.0 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=42.222.166.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=230.193.170.247 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=42.222.166.0 spt=48221 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:17 rt=1694228297053 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e0355d-1ace7130 cn2=48221 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=42.222.166.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48221
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1694228297053
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 42.222.166.0
serverIP: 230.193.170.247
userName: - | Explain this syslog message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=139.236.47.142 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.87.33.131 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.87.33.131 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45268,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/MLSubscribe.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694228290627 ",
"message": "<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=139.236.47.142 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=151.87.33.131 spt=45268 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.87.33.131 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "151.87.33.131",
"serverIP": "139.236.47.142",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=139.236.47.142 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.87.33.131 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.87.33.131 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=139.236.47.142 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.87.33.131 spt=45268 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290627 request=/comm/MLSubscribe.jsp requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01c43-1aca720d cn2=45268 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.87.33.131 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45268
facilitycode: 23
facilitylabel: local7
fqdn: /comm/MLSubscribe.jsp
localhostname: WAFirewall
localstarttime: 1694228290627
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 151.87.33.131
serverIP: 139.236.47.142
userName: - | Explain this syslog message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=195.83.6.194 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=215.20.159.170 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=215.20.159.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44133,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/tornado",
"localhostname": "WAFirewall",
"localstarttime": "1694228288221 ",
"message": "<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=195.83.6.194 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=215.20.159.170 spt=44133 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=215.20.159.170 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "215.20.159.170",
"serverIP": "195.83.6.194",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=195.83.6.194 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=215.20.159.170 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=215.20.159.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=195.83.6.194 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=215.20.159.170 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=215.20.159.170 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44133
facilitycode: 23
facilitylabel: local7
fqdn: /tornado
localhostname: WAFirewall
localstarttime: 1694228288221
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 215.20.159.170
serverIP: 195.83.6.194
userName: - | Explain this syslog message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.164.246.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.243.134.77 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.243.134.77 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44133,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/tornado",
"localhostname": "WAFirewall",
"localstarttime": "1694228288221 ",
"message": "<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.164.246.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=255.243.134.77 spt=44133 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.243.134.77 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "255.243.134.77",
"serverIP": "42.164.246.241",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.164.246.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.243.134.77 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.243.134.77 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.164.246.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.243.134.77 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.243.134.77 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44133
facilitycode: 23
facilitylabel: local7
fqdn: /tornado
localhostname: WAFirewall
localstarttime: 1694228288221
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 255.243.134.77
serverIP: 42.164.246.241
userName: - | Explain this syslog message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=118.0.220.205 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=29.68.133.135 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.68.133.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44133,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/tornado",
"localhostname": "WAFirewall",
"localstarttime": "1694228288221 ",
"message": "<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=118.0.220.205 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=29.68.133.135 spt=44133 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.68.133.135 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "29.68.133.135",
"serverIP": "118.0.220.205",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=118.0.220.205 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=29.68.133.135 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.68.133.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:08 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=118.0.220.205 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=29.68.133.135 spt=44133 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:08 rt=1694228288221 request=/tornado requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e012a1-13ca290f cn2=44133 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.68.133.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44133
facilitycode: 23
facilitylabel: local7
fqdn: /tornado
localhostname: WAFirewall
localstarttime: 1694228288221
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 29.68.133.135
serverIP: 118.0.220.205
userName: - | Explain this syslog message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.52.127.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=132.40.22.243 spt=45107 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=132.40.22.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45107,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/hud",
"localhostname": "WAFirewall",
"localstarttime": "1694228290159 ",
"message": "<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.52.127.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=132.40.22.243 spt=45107 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=132.40.22.243 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "132.40.22.243",
"serverIP": "180.52.127.21",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.52.127.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=132.40.22.243 spt=45107 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=132.40.22.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=180.52.127.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=132.40.22.243 spt=45107 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=132.40.22.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45107
facilitycode: 23
facilitylabel: local7
fqdn: /hud
localhostname: WAFirewall
localstarttime: 1694228290159
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 132.40.22.243
serverIP: 180.52.127.21
userName: - | Explain this syslog message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.18.211.86 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.218.237.173 spt=45107 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.218.237.173 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45107,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/hud",
"localhostname": "WAFirewall",
"localstarttime": "1694228290159 ",
"message": "<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.18.211.86 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=21.218.237.173 spt=45107 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.218.237.173 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "21.218.237.173",
"serverIP": "156.18.211.86",
"userName": "-"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.