input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.18.211.86 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.218.237.173 spt=45107 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.218.237.173 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.18.211.86 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.218.237.173 spt=45107 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.218.237.173 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45107
facilitycode: 23
facilitylabel: local7
fqdn: /hud
localhostname: WAFirewall
localstarttime: 1694228290159
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 21.218.237.173
serverIP: 156.18.211.86
userName: - | Explain this syslog message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.115.21.117 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.254.96.1 spt=45107 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.254.96.1 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45107,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/hud",
"localhostname": "WAFirewall",
"localstarttime": "1694228290159 ",
"message": "<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.115.21.117 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=40.254.96.1 spt=45107 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication=\"Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)\" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.254.96.1 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:185.185.217.76",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "40.254.96.1",
"serverIP": "87.115.21.117",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.115.21.117 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.254.96.1 spt=45107 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.254.96.1 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 8 21:58:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.115.21.117 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.254.96.1 spt=45107 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 08 2023 21:58:10 rt=1694228290159 request=/hud requestClientApplication="Mozilla/5.0 (compatible; intelx.io_bot +https://intelx.io)" dvchost=WAFirewall externalId=18a77e01a6f-ec8fbf9 cn2=45107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.254.96.1 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45107
facilitycode: 23
facilitylabel: local7
fqdn: /hud
localhostname: WAFirewall
localstarttime: 1694228290159
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:185.185.217.76', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 40.254.96.1
serverIP: 87.115.21.117
userName: - | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=106.207.190.179 dst=218.85.59.200 protocol=tcp sport=51735 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=106.207.190.179 dst=218.85.59.200 protocol=tcp sport=51735 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51735,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "106.207.190.179",
"serverIP": "218.85.59.200"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=106.207.190.179 dst=218.85.59.200 protocol=tcp sport=51735 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=106.207.190.179 dst=218.85.59.200 protocol=tcp sport=51735 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51735
protocol: 6
streamName: meraki_l7_firewall
clientIP: 106.207.190.179
serverIP: 218.85.59.200 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=168.90.159.213 dst=169.57.206.45 protocol=tcp sport=51735 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=168.90.159.213 dst=169.57.206.45 protocol=tcp sport=51735 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51735,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "168.90.159.213",
"serverIP": "169.57.206.45"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=168.90.159.213 dst=169.57.206.45 protocol=tcp sport=51735 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=168.90.159.213 dst=169.57.206.45 protocol=tcp sport=51735 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51735
protocol: 6
streamName: meraki_l7_firewall
clientIP: 168.90.159.213
serverIP: 169.57.206.45 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=243.54.53.123 dst=157.1.170.206 protocol=tcp sport=51735 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=243.54.53.123 dst=157.1.170.206 protocol=tcp sport=51735 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51735,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "243.54.53.123",
"serverIP": "157.1.170.206"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=243.54.53.123 dst=157.1.170.206 protocol=tcp sport=51735 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=243.54.53.123 dst=157.1.170.206 protocol=tcp sport=51735 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51735
protocol: 6
streamName: meraki_l7_firewall
clientIP: 243.54.53.123
serverIP: 157.1.170.206 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=242.47.158.173 dst=33.33.7.78 protocol=tcp sport=51735 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=242.47.158.173 dst=33.33.7.78 protocol=tcp sport=51735 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51735,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "242.47.158.173",
"serverIP": "33.33.7.78"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=242.47.158.173 dst=33.33.7.78 protocol=tcp sport=51735 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656616696.042189575 NORDC_MX400_1 l7_firewall src=242.47.158.173 dst=33.33.7.78 protocol=tcp sport=51735 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51735
protocol: 6
streamName: meraki_l7_firewall
clientIP: 242.47.158.173
serverIP: 33.33.7.78 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=1.173.14.137 dst=211.93.151.219 protocol=tcp sport=51269 dport=443 decision=blocked | {
"action": "block",
"clientport": 51269,
"message": "<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=1.173.14.137 dst=211.93.151.219 protocol=tcp sport=51269 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "1.173.14.137",
"serverIP": "211.93.151.219"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=1.173.14.137 dst=211.93.151.219 protocol=tcp sport=51269 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=1.173.14.137 dst=211.93.151.219 protocol=tcp sport=51269 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51269
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 1.173.14.137
serverIP: 211.93.151.219 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=205.151.219.49 dst=94.156.135.43 protocol=tcp sport=51269 dport=443 decision=blocked | {
"action": "block",
"clientport": 51269,
"message": "<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=205.151.219.49 dst=94.156.135.43 protocol=tcp sport=51269 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "205.151.219.49",
"serverIP": "94.156.135.43"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=205.151.219.49 dst=94.156.135.43 protocol=tcp sport=51269 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=205.151.219.49 dst=94.156.135.43 protocol=tcp sport=51269 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51269
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 205.151.219.49
serverIP: 94.156.135.43 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=73.112.215.221 dst=71.166.215.0 protocol=tcp sport=51269 dport=443 decision=blocked | {
"action": "block",
"clientport": 51269,
"message": "<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=73.112.215.221 dst=71.166.215.0 protocol=tcp sport=51269 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "73.112.215.221",
"serverIP": "71.166.215.0"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=73.112.215.221 dst=71.166.215.0 protocol=tcp sport=51269 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=73.112.215.221 dst=71.166.215.0 protocol=tcp sport=51269 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51269
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 73.112.215.221
serverIP: 71.166.215.0 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=177.45.201.188 dst=167.168.241.171 protocol=tcp sport=51269 dport=443 decision=blocked | {
"action": "block",
"clientport": 51269,
"message": "<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=177.45.201.188 dst=167.168.241.171 protocol=tcp sport=51269 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "177.45.201.188",
"serverIP": "167.168.241.171"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=177.45.201.188 dst=167.168.241.171 protocol=tcp sport=51269 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1689704055.822779790 M61_MX67C_Savannah l7_firewall src=177.45.201.188 dst=167.168.241.171 protocol=tcp sport=51269 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51269
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 177.45.201.188
serverIP: 167.168.241.171 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=160.216.244.115 dst=132.174.63.181 protocol=tcp sport=443 dport=53312 decision=blocked | {
"action": "block",
"clientport": 53312,
"message": "<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=160.216.244.115 dst=132.174.63.181 protocol=tcp sport=443 dport=53312 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "132.174.63.181",
"serverIP": "160.216.244.115"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=160.216.244.115 dst=132.174.63.181 protocol=tcp sport=443 dport=53312 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=160.216.244.115 dst=132.174.63.181 protocol=tcp sport=443 dport=53312 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53312
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 132.174.63.181
serverIP: 160.216.244.115 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=184.190.167.193 dst=202.73.82.103 protocol=tcp sport=443 dport=53312 decision=blocked | {
"action": "block",
"clientport": 53312,
"message": "<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=184.190.167.193 dst=202.73.82.103 protocol=tcp sport=443 dport=53312 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "202.73.82.103",
"serverIP": "184.190.167.193"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=184.190.167.193 dst=202.73.82.103 protocol=tcp sport=443 dport=53312 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=184.190.167.193 dst=202.73.82.103 protocol=tcp sport=443 dport=53312 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53312
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 202.73.82.103
serverIP: 184.190.167.193 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=76.65.17.75 dst=12.224.125.128 protocol=tcp sport=443 dport=53312 decision=blocked | {
"action": "block",
"clientport": 53312,
"message": "<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=76.65.17.75 dst=12.224.125.128 protocol=tcp sport=443 dport=53312 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "12.224.125.128",
"serverIP": "76.65.17.75"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=76.65.17.75 dst=12.224.125.128 protocol=tcp sport=443 dport=53312 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=76.65.17.75 dst=12.224.125.128 protocol=tcp sport=443 dport=53312 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53312
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 12.224.125.128
serverIP: 76.65.17.75 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=138.221.117.223 dst=133.146.73.138 protocol=tcp sport=443 dport=53312 decision=blocked | {
"action": "block",
"clientport": 53312,
"message": "<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=138.221.117.223 dst=133.146.73.138 protocol=tcp sport=443 dport=53312 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "133.146.73.138",
"serverIP": "138.221.117.223"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=138.221.117.223 dst=133.146.73.138 protocol=tcp sport=443 dport=53312 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690034664.929126540 NORDC_MX400_1 l7_firewall src=138.221.117.223 dst=133.146.73.138 protocol=tcp sport=443 dport=53312 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53312
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 133.146.73.138
serverIP: 138.221.117.223 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=116.116.252.133 dst=28.244.134.134 protocol=tcp sport=80 dport=30327 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=116.116.252.133 dst=28.244.134.134 protocol=tcp sport=80 dport=30327 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 30327,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "28.244.134.134",
"serverIP": "116.116.252.133"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=116.116.252.133 dst=28.244.134.134 protocol=tcp sport=80 dport=30327 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=116.116.252.133 dst=28.244.134.134 protocol=tcp sport=80 dport=30327 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 30327
protocol: 6
streamName: meraki_l7_firewall
clientIP: 28.244.134.134
serverIP: 116.116.252.133 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=118.124.81.29 dst=114.93.226.126 protocol=tcp sport=80 dport=30327 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=118.124.81.29 dst=114.93.226.126 protocol=tcp sport=80 dport=30327 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 30327,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "114.93.226.126",
"serverIP": "118.124.81.29"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=118.124.81.29 dst=114.93.226.126 protocol=tcp sport=80 dport=30327 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=118.124.81.29 dst=114.93.226.126 protocol=tcp sport=80 dport=30327 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 30327
protocol: 6
streamName: meraki_l7_firewall
clientIP: 114.93.226.126
serverIP: 118.124.81.29 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=213.18.216.188 dst=50.153.94.7 protocol=tcp sport=80 dport=30327 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=213.18.216.188 dst=50.153.94.7 protocol=tcp sport=80 dport=30327 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 30327,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "50.153.94.7",
"serverIP": "213.18.216.188"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=213.18.216.188 dst=50.153.94.7 protocol=tcp sport=80 dport=30327 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=213.18.216.188 dst=50.153.94.7 protocol=tcp sport=80 dport=30327 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 30327
protocol: 6
streamName: meraki_l7_firewall
clientIP: 50.153.94.7
serverIP: 213.18.216.188 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=53.218.35.177 dst=24.201.8.82 protocol=tcp sport=80 dport=30327 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=53.218.35.177 dst=24.201.8.82 protocol=tcp sport=80 dport=30327 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 30327,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "24.201.8.82",
"serverIP": "53.218.35.177"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=53.218.35.177 dst=24.201.8.82 protocol=tcp sport=80 dport=30327 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659496681.949300204 NORDC_MX400_1 l7_firewall src=53.218.35.177 dst=24.201.8.82 protocol=tcp sport=80 dport=30327 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 30327
protocol: 6
streamName: meraki_l7_firewall
clientIP: 24.201.8.82
serverIP: 53.218.35.177 | Explain this syslog message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=255.22.47.10 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=37.187.0.142 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.187.0.142 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48972,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1688569670341 ",
"message": "<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=255.22.47.10 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=37.187.0.142 spt=48972 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)\" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.187.0.142 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:51.222.253.17",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "37.187.0.142",
"serverIP": "255.22.47.10",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=255.22.47.10 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=37.187.0.142 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.187.0.142 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=255.22.47.10 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=37.187.0.142 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.187.0.142 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48972
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1688569670341
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:51.222.253.17', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 37.187.0.142
serverIP: 255.22.47.10
userName: - | Explain this syslog message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=137.129.184.9 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=193.80.37.138 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=193.80.37.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48972,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1688569670341 ",
"message": "<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=137.129.184.9 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=193.80.37.138 spt=48972 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)\" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=193.80.37.138 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:51.222.253.17",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "193.80.37.138",
"serverIP": "137.129.184.9",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=137.129.184.9 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=193.80.37.138 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=193.80.37.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=137.129.184.9 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=193.80.37.138 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=193.80.37.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48972
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1688569670341
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:51.222.253.17', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 193.80.37.138
serverIP: 137.129.184.9
userName: - | Explain this syslog message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=140.224.22.106 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=144.33.22.189 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.33.22.189 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48972,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1688569670341 ",
"message": "<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=140.224.22.106 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=144.33.22.189 spt=48972 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)\" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.33.22.189 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:51.222.253.17",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "144.33.22.189",
"serverIP": "140.224.22.106",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=140.224.22.106 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=144.33.22.189 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.33.22.189 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=140.224.22.106 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=144.33.22.189 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.33.22.189 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48972
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1688569670341
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:51.222.253.17', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 144.33.22.189
serverIP: 140.224.22.106
userName: - | Explain this syslog message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.213.175.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=240.24.132.38 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.24.132.38 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48972,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1688569670341 ",
"message": "<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.213.175.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=240.24.132.38 spt=48972 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)\" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.24.132.38 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:51.222.253.17",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "240.24.132.38",
"serverIP": "159.213.175.135",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.213.175.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=240.24.132.38 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.24.132.38 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.213.175.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=240.24.132.38 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.24.132.38 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48972
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1688569670341
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:51.222.253.17', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 240.24.132.38
serverIP: 159.213.175.135
userName: - | Explain this syslog message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=249.66.244.130 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.188.232.0 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.188.232.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48972,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1688569670341 ",
"message": "<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=249.66.244.130 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=10.188.232.0 spt=48972 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)\" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.188.232.0 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:51.222.253.17",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "10.188.232.0",
"serverIP": "249.66.244.130",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=249.66.244.130 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.188.232.0 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.188.232.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 5 10:07:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=249.66.244.130 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.188.232.0 spt=48972 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 05 2023 10:07:50 rt=1688569670341 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18926986aa9-dc5ece4 cn2=48972 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.188.232.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48972
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1688569670341
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:51.222.253.17', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 10.188.232.0
serverIP: 249.66.244.130
userName: - | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=134.244.126.122 dst=61.155.139.190 protocol=udp sport=50021 dport=60897 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 50021,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=134.244.126.122 dst=61.155.139.190 protocol=udp sport=50021 dport=60897 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60897,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "61.155.139.190",
"serverIP": "134.244.126.122"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=134.244.126.122 dst=61.155.139.190 protocol=udp sport=50021 dport=60897 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=134.244.126.122 dst=61.155.139.190 protocol=udp sport=50021 dport=60897 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 50021
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60897
protocol: 17
streamName: meraki_l7_firewall
clientIP: 61.155.139.190
serverIP: 134.244.126.122 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=247.250.207.117 dst=23.58.36.104 protocol=udp sport=50021 dport=60897 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 50021,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=247.250.207.117 dst=23.58.36.104 protocol=udp sport=50021 dport=60897 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60897,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "23.58.36.104",
"serverIP": "247.250.207.117"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=247.250.207.117 dst=23.58.36.104 protocol=udp sport=50021 dport=60897 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=247.250.207.117 dst=23.58.36.104 protocol=udp sport=50021 dport=60897 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 50021
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60897
protocol: 17
streamName: meraki_l7_firewall
clientIP: 23.58.36.104
serverIP: 247.250.207.117 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=231.222.147.123 dst=83.80.139.70 protocol=udp sport=50021 dport=60897 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 50021,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=231.222.147.123 dst=83.80.139.70 protocol=udp sport=50021 dport=60897 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60897,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "83.80.139.70",
"serverIP": "231.222.147.123"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=231.222.147.123 dst=83.80.139.70 protocol=udp sport=50021 dport=60897 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=231.222.147.123 dst=83.80.139.70 protocol=udp sport=50021 dport=60897 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 50021
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60897
protocol: 17
streamName: meraki_l7_firewall
clientIP: 83.80.139.70
serverIP: 231.222.147.123 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=67.225.48.26 dst=216.32.231.236 protocol=udp sport=50021 dport=60897 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 50021,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=67.225.48.26 dst=216.32.231.236 protocol=udp sport=50021 dport=60897 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60897,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "216.32.231.236",
"serverIP": "67.225.48.26"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=67.225.48.26 dst=216.32.231.236 protocol=udp sport=50021 dport=60897 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1655092951.781068397 M93_MX67C_MECCumming l7_firewall src=67.225.48.26 dst=216.32.231.236 protocol=udp sport=50021 dport=60897 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 50021
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60897
protocol: 17
streamName: meraki_l7_firewall
clientIP: 216.32.231.236
serverIP: 67.225.48.26 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=132.242.229.93 dst=155.125.96.214 protocol=tcp sport=56931 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=132.242.229.93 dst=155.125.96.214 protocol=tcp sport=56931 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56931,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "132.242.229.93",
"serverIP": "155.125.96.214"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=132.242.229.93 dst=155.125.96.214 protocol=tcp sport=56931 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=132.242.229.93 dst=155.125.96.214 protocol=tcp sport=56931 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56931
protocol: 6
streamName: meraki_l7_firewall
clientIP: 132.242.229.93
serverIP: 155.125.96.214 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=75.248.229.122 dst=11.20.3.121 protocol=tcp sport=56931 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=75.248.229.122 dst=11.20.3.121 protocol=tcp sport=56931 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56931,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "75.248.229.122",
"serverIP": "11.20.3.121"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=75.248.229.122 dst=11.20.3.121 protocol=tcp sport=56931 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=75.248.229.122 dst=11.20.3.121 protocol=tcp sport=56931 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56931
protocol: 6
streamName: meraki_l7_firewall
clientIP: 75.248.229.122
serverIP: 11.20.3.121 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=219.54.204.189 dst=218.219.159.87 protocol=tcp sport=56931 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=219.54.204.189 dst=218.219.159.87 protocol=tcp sport=56931 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56931,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "219.54.204.189",
"serverIP": "218.219.159.87"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=219.54.204.189 dst=218.219.159.87 protocol=tcp sport=56931 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=219.54.204.189 dst=218.219.159.87 protocol=tcp sport=56931 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56931
protocol: 6
streamName: meraki_l7_firewall
clientIP: 219.54.204.189
serverIP: 218.219.159.87 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=65.185.251.126 dst=220.112.161.245 protocol=tcp sport=56931 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=65.185.251.126 dst=220.112.161.245 protocol=tcp sport=56931 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56931,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "65.185.251.126",
"serverIP": "220.112.161.245"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=65.185.251.126 dst=220.112.161.245 protocol=tcp sport=56931 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1656430998.557903319 M49_MX67C_Montgomery l7_firewall src=65.185.251.126 dst=220.112.161.245 protocol=tcp sport=56931 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56931
protocol: 6
streamName: meraki_l7_firewall
clientIP: 65.185.251.126
serverIP: 220.112.161.245 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=157.172.223.72 dst=93.81.136.198 protocol=tcp sport=54499 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=157.172.223.72 dst=93.81.136.198 protocol=tcp sport=54499 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54499,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "157.172.223.72",
"serverIP": "93.81.136.198"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=157.172.223.72 dst=93.81.136.198 protocol=tcp sport=54499 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=157.172.223.72 dst=93.81.136.198 protocol=tcp sport=54499 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54499
protocol: 6
streamName: meraki_l7_firewall
clientIP: 157.172.223.72
serverIP: 93.81.136.198 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=151.208.33.120 dst=189.62.199.136 protocol=tcp sport=54499 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=151.208.33.120 dst=189.62.199.136 protocol=tcp sport=54499 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54499,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "151.208.33.120",
"serverIP": "189.62.199.136"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=151.208.33.120 dst=189.62.199.136 protocol=tcp sport=54499 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=151.208.33.120 dst=189.62.199.136 protocol=tcp sport=54499 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54499
protocol: 6
streamName: meraki_l7_firewall
clientIP: 151.208.33.120
serverIP: 189.62.199.136 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=123.185.152.202 dst=2.227.24.100 protocol=tcp sport=54499 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=123.185.152.202 dst=2.227.24.100 protocol=tcp sport=54499 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54499,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "123.185.152.202",
"serverIP": "2.227.24.100"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=123.185.152.202 dst=2.227.24.100 protocol=tcp sport=54499 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.