input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=123.185.152.202 dst=2.227.24.100 protocol=tcp sport=54499 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54499
protocol: 6
streamName: meraki_l7_firewall
clientIP: 123.185.152.202
serverIP: 2.227.24.100 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=121.114.62.21 dst=147.42.144.117 protocol=tcp sport=54499 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=121.114.62.21 dst=147.42.144.117 protocol=tcp sport=54499 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54499,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "121.114.62.21",
"serverIP": "147.42.144.117"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=121.114.62.21 dst=147.42.144.117 protocol=tcp sport=54499 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1656431025.563749395 M83_MX67C_MuscleShoals l7_firewall src=121.114.62.21 dst=147.42.144.117 protocol=tcp sport=54499 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54499
protocol: 6
streamName: meraki_l7_firewall
clientIP: 121.114.62.21
serverIP: 147.42.144.117 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=103.9.86.139 dst=30.68.57.73 protocol=tcp sport=57893 dport=443 decision=blocked | {
"action": "block",
"clientport": 57893,
"message": "<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=103.9.86.139 dst=30.68.57.73 protocol=tcp sport=57893 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "103.9.86.139",
"serverIP": "30.68.57.73"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=103.9.86.139 dst=30.68.57.73 protocol=tcp sport=57893 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=103.9.86.139 dst=30.68.57.73 protocol=tcp sport=57893 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57893
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 103.9.86.139
serverIP: 30.68.57.73 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=115.204.0.36 dst=156.235.86.95 protocol=tcp sport=57893 dport=443 decision=blocked | {
"action": "block",
"clientport": 57893,
"message": "<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=115.204.0.36 dst=156.235.86.95 protocol=tcp sport=57893 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "115.204.0.36",
"serverIP": "156.235.86.95"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=115.204.0.36 dst=156.235.86.95 protocol=tcp sport=57893 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=115.204.0.36 dst=156.235.86.95 protocol=tcp sport=57893 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57893
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 115.204.0.36
serverIP: 156.235.86.95 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=213.197.0.197 dst=238.8.98.214 protocol=tcp sport=57893 dport=443 decision=blocked | {
"action": "block",
"clientport": 57893,
"message": "<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=213.197.0.197 dst=238.8.98.214 protocol=tcp sport=57893 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "213.197.0.197",
"serverIP": "238.8.98.214"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=213.197.0.197 dst=238.8.98.214 protocol=tcp sport=57893 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=213.197.0.197 dst=238.8.98.214 protocol=tcp sport=57893 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57893
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 213.197.0.197
serverIP: 238.8.98.214 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=251.176.42.48 dst=218.7.220.54 protocol=tcp sport=57893 dport=443 decision=blocked | {
"action": "block",
"clientport": 57893,
"message": "<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=251.176.42.48 dst=218.7.220.54 protocol=tcp sport=57893 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "251.176.42.48",
"serverIP": "218.7.220.54"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=251.176.42.48 dst=218.7.220.54 protocol=tcp sport=57893 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1686246436.829620658 M52_MX67C_Loxley l7_firewall src=251.176.42.48 dst=218.7.220.54 protocol=tcp sport=57893 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57893
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 251.176.42.48
serverIP: 218.7.220.54 | Explain this syslog message |
<185>Aug 27 08:38:58 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=227.205.129.5 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=5.245.149.221 spt=4612 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 08:38:58 rt=1661607538824 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=182df86f088-ddc2e1c7 cn2=4612 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=5.245.149.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:64.62.197.182",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 27 08:38:58 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=227.205.129.5 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=5.245.149.221 spt=4612 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 27 2022 08:38:58 rt=1661607538824 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=182df86f088-ddc2e1c7 cn2=4612 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=5.245.149.221 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661607538824 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 4612,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "5.245.149.221",
"serverIP": "227.205.129.5",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 27 08:38:58 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=227.205.129.5 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=5.245.149.221 spt=4612 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 08:38:58 rt=1661607538824 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=182df86f088-ddc2e1c7 cn2=4612 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=5.245.149.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 27 08:38:58 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=227.205.129.5 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=5.245.149.221 spt=4612 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 08:38:58 rt=1661607538824 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=182df86f088-ddc2e1c7 cn2=4612 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=5.245.149.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:64.62.197.182', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661607538824
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 4612
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 5.245.149.221
serverIP: 227.205.129.5
userName: - | Explain this syslog message |
<185>Aug 27 08:38:58 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=133.210.103.153 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=28.172.21.96 spt=4612 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 08:38:58 rt=1661607538824 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=182df86f088-ddc2e1c7 cn2=4612 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.172.21.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:64.62.197.182",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 27 08:38:58 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=133.210.103.153 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=28.172.21.96 spt=4612 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 27 2022 08:38:58 rt=1661607538824 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=182df86f088-ddc2e1c7 cn2=4612 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.172.21.96 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661607538824 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 4612,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "28.172.21.96",
"serverIP": "133.210.103.153",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 27 08:38:58 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=133.210.103.153 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=28.172.21.96 spt=4612 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 08:38:58 rt=1661607538824 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=182df86f088-ddc2e1c7 cn2=4612 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.172.21.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 27 08:38:58 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=133.210.103.153 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=28.172.21.96 spt=4612 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 08:38:58 rt=1661607538824 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=182df86f088-ddc2e1c7 cn2=4612 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.172.21.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:64.62.197.182', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661607538824
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 4612
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 28.172.21.96
serverIP: 133.210.103.153
userName: - | Explain this syslog message |
<185>Aug 27 08:38:58 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=64.187.32.160 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=44.130.26.148 spt=4612 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 08:38:58 rt=1661607538824 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=182df86f088-ddc2e1c7 cn2=4612 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.130.26.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:64.62.197.182",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 27 08:38:58 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=64.187.32.160 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=44.130.26.148 spt=4612 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 27 2022 08:38:58 rt=1661607538824 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=182df86f088-ddc2e1c7 cn2=4612 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.130.26.148 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661607538824 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 4612,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "44.130.26.148",
"serverIP": "64.187.32.160",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 27 08:38:58 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=64.187.32.160 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=44.130.26.148 spt=4612 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 08:38:58 rt=1661607538824 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=182df86f088-ddc2e1c7 cn2=4612 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.130.26.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 27 08:38:58 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=64.187.32.160 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=44.130.26.148 spt=4612 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 27 2022 08:38:58 rt=1661607538824 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=182df86f088-ddc2e1c7 cn2=4612 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.130.26.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:64.62.197.182', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661607538824
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 4612
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 44.130.26.148
serverIP: 64.187.32.160
userName: - | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=89.133.245.235 dst=48.108.82.158 protocol=tcp sport=59037 dport=443 decision=blocked | {
"action": "block",
"clientport": 59037,
"message": "<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=89.133.245.235 dst=48.108.82.158 protocol=tcp sport=59037 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "89.133.245.235",
"serverIP": "48.108.82.158"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=89.133.245.235 dst=48.108.82.158 protocol=tcp sport=59037 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=89.133.245.235 dst=48.108.82.158 protocol=tcp sport=59037 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59037
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 89.133.245.235
serverIP: 48.108.82.158 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=128.106.187.204 dst=163.154.19.32 protocol=tcp sport=59037 dport=443 decision=blocked | {
"action": "block",
"clientport": 59037,
"message": "<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=128.106.187.204 dst=163.154.19.32 protocol=tcp sport=59037 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "128.106.187.204",
"serverIP": "163.154.19.32"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=128.106.187.204 dst=163.154.19.32 protocol=tcp sport=59037 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=128.106.187.204 dst=163.154.19.32 protocol=tcp sport=59037 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59037
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 128.106.187.204
serverIP: 163.154.19.32 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=121.69.53.31 dst=123.152.107.9 protocol=tcp sport=59037 dport=443 decision=blocked | {
"action": "block",
"clientport": 59037,
"message": "<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=121.69.53.31 dst=123.152.107.9 protocol=tcp sport=59037 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "121.69.53.31",
"serverIP": "123.152.107.9"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=121.69.53.31 dst=123.152.107.9 protocol=tcp sport=59037 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=121.69.53.31 dst=123.152.107.9 protocol=tcp sport=59037 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59037
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 121.69.53.31
serverIP: 123.152.107.9 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=235.181.93.32 dst=19.193.192.138 protocol=tcp sport=59037 dport=443 decision=blocked | {
"action": "block",
"clientport": 59037,
"message": "<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=235.181.93.32 dst=19.193.192.138 protocol=tcp sport=59037 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "235.181.93.32",
"serverIP": "19.193.192.138"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=235.181.93.32 dst=19.193.192.138 protocol=tcp sport=59037 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689784706.675111929 NORDC_MX400_1 l7_firewall src=235.181.93.32 dst=19.193.192.138 protocol=tcp sport=59037 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59037
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 235.181.93.32
serverIP: 19.193.192.138 | Explain this syslog message |
<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=228.70.115.72 dst=114.95.52.119 protocol=udp sport=53469 dport=27299 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 27299,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=228.70.115.72 dst=114.95.52.119 protocol=udp sport=53469 dport=27299 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 53469,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "228.70.115.72",
"serverIP": "114.95.52.119"
} | Create a JSON artifact from the message |
<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=228.70.115.72 dst=114.95.52.119 protocol=udp sport=53469 dport=27299 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=228.70.115.72 dst=114.95.52.119 protocol=udp sport=53469 dport=27299 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 27299
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 53469
protocol: 17
streamName: meraki_l7_firewall
clientIP: 228.70.115.72
serverIP: 114.95.52.119 | Explain this syslog message |
<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=216.74.8.113 dst=218.22.84.154 protocol=udp sport=53469 dport=27299 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 27299,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=216.74.8.113 dst=218.22.84.154 protocol=udp sport=53469 dport=27299 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 53469,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "216.74.8.113",
"serverIP": "218.22.84.154"
} | Create a JSON artifact from the message |
<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=216.74.8.113 dst=218.22.84.154 protocol=udp sport=53469 dport=27299 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=216.74.8.113 dst=218.22.84.154 protocol=udp sport=53469 dport=27299 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 27299
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 53469
protocol: 17
streamName: meraki_l7_firewall
clientIP: 216.74.8.113
serverIP: 218.22.84.154 | Explain this syslog message |
<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=58.104.249.122 dst=50.125.39.38 protocol=udp sport=53469 dport=27299 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 27299,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=58.104.249.122 dst=50.125.39.38 protocol=udp sport=53469 dport=27299 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 53469,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "58.104.249.122",
"serverIP": "50.125.39.38"
} | Create a JSON artifact from the message |
<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=58.104.249.122 dst=50.125.39.38 protocol=udp sport=53469 dport=27299 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=58.104.249.122 dst=50.125.39.38 protocol=udp sport=53469 dport=27299 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 27299
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 53469
protocol: 17
streamName: meraki_l7_firewall
clientIP: 58.104.249.122
serverIP: 50.125.39.38 | Explain this syslog message |
<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=197.146.163.158 dst=192.133.147.206 protocol=udp sport=53469 dport=27299 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 27299,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=197.146.163.158 dst=192.133.147.206 protocol=udp sport=53469 dport=27299 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 53469,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "197.146.163.158",
"serverIP": "192.133.147.206"
} | Create a JSON artifact from the message |
<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=197.146.163.158 dst=192.133.147.206 protocol=udp sport=53469 dport=27299 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.138.142.46 1 1656508415.106090435 M141_MX67C_Milledgeville l7_firewall src=197.146.163.158 dst=192.133.147.206 protocol=udp sport=53469 dport=27299 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 27299
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 53469
protocol: 17
streamName: meraki_l7_firewall
clientIP: 197.146.163.158
serverIP: 192.133.147.206 | Explain this syslog message |
<185>Jul 26 20:22:01 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=128.202.75.44 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=82.17.132.116 spt=53149 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 26 2024 20:22:01 rt=1722043321145 request=/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png requestClientApplication="Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0" dvchost=WAFirewall externalId=190f1c7cb0e-48c8e2d7 cn2=53149 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=82.17.132.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53149,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png",
"localhostname": "WAFirewall",
"localstarttime": "1722043321145 ",
"message": "<185>Jul 26 20:22:01 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=128.202.75.44 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=82.17.132.116 spt=53149 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 26 2024 20:22:01 rt=1722043321145 request=/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png requestClientApplication=\"Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0\" dvchost=WAFirewall externalId=190f1c7cb0e-48c8e2d7 cn2=53149 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=82.17.132.116 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"SessionID:-",
"ProxyIP:71.18.253.166"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "82.17.132.116",
"serverIP": "128.202.75.44",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 26 20:22:01 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=128.202.75.44 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=82.17.132.116 spt=53149 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 26 2024 20:22:01 rt=1722043321145 request=/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png requestClientApplication="Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0" dvchost=WAFirewall externalId=190f1c7cb0e-48c8e2d7 cn2=53149 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=82.17.132.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 26 20:22:01 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=128.202.75.44 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=82.17.132.116 spt=53149 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 26 2024 20:22:01 rt=1722043321145 request=/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png requestClientApplication="Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0" dvchost=WAFirewall externalId=190f1c7cb0e-48c8e2d7 cn2=53149 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=82.17.132.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53149
facilitycode: 23
facilitylabel: local7
fqdn: /servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png
localhostname: WAFirewall
localstarttime: 1722043321145
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'SessionID:-', 'ProxyIP:71.18.253.166']
vendorcode: 342
streamName: barracuda_waf
clientIP: 82.17.132.116
serverIP: 128.202.75.44
userName: - | Explain this syslog message |
<185>Jul 26 20:22:01 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=228.175.201.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=190.99.162.137 spt=53149 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 26 2024 20:22:01 rt=1722043321145 request=/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png requestClientApplication="Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0" dvchost=WAFirewall externalId=190f1c7cb0e-48c8e2d7 cn2=53149 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=190.99.162.137 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53149,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png",
"localhostname": "WAFirewall",
"localstarttime": "1722043321145 ",
"message": "<185>Jul 26 20:22:01 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=228.175.201.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=190.99.162.137 spt=53149 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 26 2024 20:22:01 rt=1722043321145 request=/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png requestClientApplication=\"Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0\" dvchost=WAFirewall externalId=190f1c7cb0e-48c8e2d7 cn2=53149 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=190.99.162.137 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"SessionID:-",
"ProxyIP:71.18.253.166"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "190.99.162.137",
"serverIP": "228.175.201.48",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 26 20:22:01 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=228.175.201.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=190.99.162.137 spt=53149 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 26 2024 20:22:01 rt=1722043321145 request=/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png requestClientApplication="Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0" dvchost=WAFirewall externalId=190f1c7cb0e-48c8e2d7 cn2=53149 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=190.99.162.137 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 26 20:22:01 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=228.175.201.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=190.99.162.137 spt=53149 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 26 2024 20:22:01 rt=1722043321145 request=/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png requestClientApplication="Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0" dvchost=WAFirewall externalId=190f1c7cb0e-48c8e2d7 cn2=53149 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=190.99.162.137 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53149
facilitycode: 23
facilitylabel: local7
fqdn: /servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png
localhostname: WAFirewall
localstarttime: 1722043321145
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'SessionID:-', 'ProxyIP:71.18.253.166']
vendorcode: 342
streamName: barracuda_waf
clientIP: 190.99.162.137
serverIP: 228.175.201.48
userName: - | Explain this syslog message |
<185>Jul 26 20:22:01 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=118.174.161.46 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=69.144.42.233 spt=53149 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 26 2024 20:22:01 rt=1722043321145 request=/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png requestClientApplication="Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0" dvchost=WAFirewall externalId=190f1c7cb0e-48c8e2d7 cn2=53149 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.144.42.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53149,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png",
"localhostname": "WAFirewall",
"localstarttime": "1722043321145 ",
"message": "<185>Jul 26 20:22:01 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=118.174.161.46 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=69.144.42.233 spt=53149 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 26 2024 20:22:01 rt=1722043321145 request=/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png requestClientApplication=\"Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0\" dvchost=WAFirewall externalId=190f1c7cb0e-48c8e2d7 cn2=53149 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.144.42.233 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"SessionID:-",
"ProxyIP:71.18.253.166"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "69.144.42.233",
"serverIP": "118.174.161.46",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 26 20:22:01 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=118.174.161.46 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=69.144.42.233 spt=53149 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 26 2024 20:22:01 rt=1722043321145 request=/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png requestClientApplication="Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0" dvchost=WAFirewall externalId=190f1c7cb0e-48c8e2d7 cn2=53149 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.144.42.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 26 20:22:01 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=118.174.161.46 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=69.144.42.233 spt=53149 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 26 2024 20:22:01 rt=1722043321145 request=/servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png requestClientApplication="Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0" dvchost=WAFirewall externalId=190f1c7cb0e-48c8e2d7 cn2=53149 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.144.42.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53149
facilitycode: 23
facilitylabel: local7
fqdn: /servlet/eAndar.WebFileLibrary/39/3535333134/United%20Way%20logoUpdated.png
localhostname: WAFirewall
localstarttime: 1722043321145
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'SessionID:-', 'ProxyIP:71.18.253.166']
vendorcode: 342
streamName: barracuda_waf
clientIP: 69.144.42.233
serverIP: 118.174.161.46
userName: - | Explain this syslog message |
<185>Oct 24 00:23:41 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=240.240.196.173 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=96.84.218.254 spt=57360 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 24 2022 00:23:41 rt=1666589021823 request=/ab2h requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1840872566c-fc9e99c6 cn2=57360 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=96.84.218.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.198.203.70"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 24 00:23:41 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=240.240.196.173 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=96.84.218.254 spt=57360 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Oct 24 2022 00:23:41 rt=1666589021823 request=/ab2h requestClientApplication=\"Mozilla/5.0 zgrab/0.x\" dvchost=WAFirewall externalId=1840872566c-fc9e99c6 cn2=57360 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=96.84.218.254 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1666589021823 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/ab2h",
"clientport": 57360,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "96.84.218.254",
"serverIP": "240.240.196.173",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 24 00:23:41 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=240.240.196.173 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=96.84.218.254 spt=57360 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 24 2022 00:23:41 rt=1666589021823 request=/ab2h requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1840872566c-fc9e99c6 cn2=57360 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=96.84.218.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 24 00:23:41 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=240.240.196.173 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=96.84.218.254 spt=57360 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 24 2022 00:23:41 rt=1666589021823 request=/ab2h requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1840872566c-fc9e99c6 cn2=57360 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=96.84.218.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.198.203.70']
productids: [0]
sourceinfo: unknown
localstarttime: 1666589021823
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /ab2h
clientport: 57360
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 96.84.218.254
serverIP: 240.240.196.173
userName: - | Explain this syslog message |
<185>Oct 24 00:23:41 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=118.94.63.225 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=232.67.23.176 spt=57360 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 24 2022 00:23:41 rt=1666589021823 request=/ab2h requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1840872566c-fc9e99c6 cn2=57360 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=232.67.23.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.198.203.70"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 24 00:23:41 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=118.94.63.225 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=232.67.23.176 spt=57360 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Oct 24 2022 00:23:41 rt=1666589021823 request=/ab2h requestClientApplication=\"Mozilla/5.0 zgrab/0.x\" dvchost=WAFirewall externalId=1840872566c-fc9e99c6 cn2=57360 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=232.67.23.176 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1666589021823 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/ab2h",
"clientport": 57360,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "232.67.23.176",
"serverIP": "118.94.63.225",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 24 00:23:41 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=118.94.63.225 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=232.67.23.176 spt=57360 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 24 2022 00:23:41 rt=1666589021823 request=/ab2h requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1840872566c-fc9e99c6 cn2=57360 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=232.67.23.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 24 00:23:41 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=118.94.63.225 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=232.67.23.176 spt=57360 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 24 2022 00:23:41 rt=1666589021823 request=/ab2h requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=1840872566c-fc9e99c6 cn2=57360 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=232.67.23.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.198.203.70']
productids: [0]
sourceinfo: unknown
localstarttime: 1666589021823
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /ab2h
clientport: 57360
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 232.67.23.176
serverIP: 118.94.63.225
userName: - | Explain this syslog message |
<185>Oct 6 00:35:08 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=28.134.92.72 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=191.11.122.63 spt=40528 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 06 2022 00:35:08 rt=1665034508816 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=183abca5a10-ea86047c cn2=40528 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.11.122.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:128.1.248.42",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 6 00:35:08 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=28.134.92.72 dpt=443 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=191.11.122.63 spt=40528 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Oct 06 2022 00:35:08 rt=1665034508816 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=183abca5a10-ea86047c cn2=40528 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.11.122.63 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1665034508816 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 40528,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "191.11.122.63",
"serverIP": "28.134.92.72",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 6 00:35:08 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=28.134.92.72 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=191.11.122.63 spt=40528 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 06 2022 00:35:08 rt=1665034508816 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=183abca5a10-ea86047c cn2=40528 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.11.122.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 6 00:35:08 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=28.134.92.72 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=191.11.122.63 spt=40528 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 06 2022 00:35:08 rt=1665034508816 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=183abca5a10-ea86047c cn2=40528 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.11.122.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:128.1.248.42', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1665034508816
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 40528
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 191.11.122.63
serverIP: 28.134.92.72
userName: - | Explain this syslog message |
<185>Oct 6 00:35:08 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=73.9.60.107 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=13.53.238.68 spt=40528 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 06 2022 00:35:08 rt=1665034508816 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=183abca5a10-ea86047c cn2=40528 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.53.238.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:128.1.248.42",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 6 00:35:08 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=73.9.60.107 dpt=443 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=13.53.238.68 spt=40528 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Oct 06 2022 00:35:08 rt=1665034508816 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 \" dvchost=WAFirewall externalId=183abca5a10-ea86047c cn2=40528 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.53.238.68 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1665034508816 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 40528,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "13.53.238.68",
"serverIP": "73.9.60.107",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 6 00:35:08 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=73.9.60.107 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=13.53.238.68 spt=40528 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 06 2022 00:35:08 rt=1665034508816 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=183abca5a10-ea86047c cn2=40528 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.53.238.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 6 00:35:08 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=73.9.60.107 dpt=443 act=DENY msg=[Known Http Attack Source] duser="-" src=13.53.238.68 spt=40528 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 06 2022 00:35:08 rt=1665034508816 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=183abca5a10-ea86047c cn2=40528 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.53.238.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:128.1.248.42', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1665034508816
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 40528
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 13.53.238.68
serverIP: 73.9.60.107
userName: - | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=78.198.207.13 dst=26.32.143.61 protocol=tcp sport=55477 dport=443 decision=blocked | {
"action": "block",
"clientport": 55477,
"message": "<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=78.198.207.13 dst=26.32.143.61 protocol=tcp sport=55477 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "78.198.207.13",
"serverIP": "26.32.143.61"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=78.198.207.13 dst=26.32.143.61 protocol=tcp sport=55477 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=78.198.207.13 dst=26.32.143.61 protocol=tcp sport=55477 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55477
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 78.198.207.13
serverIP: 26.32.143.61 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=250.153.115.33 dst=14.166.185.229 protocol=tcp sport=55477 dport=443 decision=blocked | {
"action": "block",
"clientport": 55477,
"message": "<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=250.153.115.33 dst=14.166.185.229 protocol=tcp sport=55477 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "250.153.115.33",
"serverIP": "14.166.185.229"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=250.153.115.33 dst=14.166.185.229 protocol=tcp sport=55477 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=250.153.115.33 dst=14.166.185.229 protocol=tcp sport=55477 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55477
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 250.153.115.33
serverIP: 14.166.185.229 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=125.72.11.254 dst=221.117.252.32 protocol=tcp sport=55477 dport=443 decision=blocked | {
"action": "block",
"clientport": 55477,
"message": "<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=125.72.11.254 dst=221.117.252.32 protocol=tcp sport=55477 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "125.72.11.254",
"serverIP": "221.117.252.32"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=125.72.11.254 dst=221.117.252.32 protocol=tcp sport=55477 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=125.72.11.254 dst=221.117.252.32 protocol=tcp sport=55477 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55477
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 125.72.11.254
serverIP: 221.117.252.32 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=37.194.7.6 dst=234.64.52.25 protocol=tcp sport=55477 dport=443 decision=blocked | {
"action": "block",
"clientport": 55477,
"message": "<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=37.194.7.6 dst=234.64.52.25 protocol=tcp sport=55477 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "37.194.7.6",
"serverIP": "234.64.52.25"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=37.194.7.6 dst=234.64.52.25 protocol=tcp sport=55477 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1686890559.880198771 M64_MX67C_Augusta l7_firewall src=37.194.7.6 dst=234.64.52.25 protocol=tcp sport=55477 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55477
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 37.194.7.6
serverIP: 234.64.52.25 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=40.218.250.19 dst=153.191.211.2 protocol=tcp sport=54145 dport=443 decision=blocked | {
"action": "block",
"clientport": 54145,
"message": "<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=40.218.250.19 dst=153.191.211.2 protocol=tcp sport=54145 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "40.218.250.19",
"serverIP": "153.191.211.2"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=40.218.250.19 dst=153.191.211.2 protocol=tcp sport=54145 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=40.218.250.19 dst=153.191.211.2 protocol=tcp sport=54145 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54145
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 40.218.250.19
serverIP: 153.191.211.2 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=140.178.38.79 dst=0.102.58.169 protocol=tcp sport=54145 dport=443 decision=blocked | {
"action": "block",
"clientport": 54145,
"message": "<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=140.178.38.79 dst=0.102.58.169 protocol=tcp sport=54145 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "140.178.38.79",
"serverIP": "0.102.58.169"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=140.178.38.79 dst=0.102.58.169 protocol=tcp sport=54145 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=140.178.38.79 dst=0.102.58.169 protocol=tcp sport=54145 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54145
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 140.178.38.79
serverIP: 0.102.58.169 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=168.113.65.89 dst=127.205.98.123 protocol=tcp sport=54145 dport=443 decision=blocked | {
"action": "block",
"clientport": 54145,
"message": "<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=168.113.65.89 dst=127.205.98.123 protocol=tcp sport=54145 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "168.113.65.89",
"serverIP": "127.205.98.123"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=168.113.65.89 dst=127.205.98.123 protocol=tcp sport=54145 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=168.113.65.89 dst=127.205.98.123 protocol=tcp sport=54145 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54145
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 168.113.65.89
serverIP: 127.205.98.123 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=135.170.45.184 dst=184.193.31.220 protocol=tcp sport=54145 dport=443 decision=blocked | {
"action": "block",
"clientport": 54145,
"message": "<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=135.170.45.184 dst=184.193.31.220 protocol=tcp sport=54145 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "135.170.45.184",
"serverIP": "184.193.31.220"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=135.170.45.184 dst=184.193.31.220 protocol=tcp sport=54145 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1686748932.740801880 NORDC_MX400_1 l7_firewall src=135.170.45.184 dst=184.193.31.220 protocol=tcp sport=54145 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54145
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 135.170.45.184
serverIP: 184.193.31.220 | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Wenda Yee | Portfolio Management","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhx2d5xlR4wXX697","status":"ACTIVE","created":"2022-09-27T14:53:59.000Z","activated":"2022-09-27T14:53:59.000Z","statusChanged":"2023-06-20T14:50:57.000Z","lastLogin":"2023-07-17T20:24:18.000Z","lastUpdated":"2023-06-20T14:50:57.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Wenda","lastName":"Yee","primaryPhone":"(949) 345-7663","immutableID":"8cSuYJVyTEWjgfxvV8p2CQ==","mobilePhone":null,"displayName":"Wenda Yee","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"Portfolio Management","login":"charlie","email":"charlie"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhx2d5xlR4wXX697","type":"User","alternateId":"charlie","displayName":"Wenda Yee","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36","os":"Windows 10","browser":"CHROME"},"zone":"null","device":"Computer","id":null,"ipAddress":"226.185.217.144","geographicalContext":{"city":"Rowland Heights","state":"California","country":"United States","postalCode":"91748","geolocation":{"lat":33.9854,"lon":-117.8972}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxYW6g7Ak_Tia_Zb002eFu-Q"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-17T20:22:21.563Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLWi9BMA607PldfRdOkVuwWAYNERw","deviceFingerprint":"7d8df8b5c254a23e1e5c496e09219af3","requestId":"ZLWi_NDDS5SPkT1gJIEHUwAACJU","dtHash":"28d3d1c7a9957c80f0dccdc96d4190f2bffc3beb6fdbde0d0502b27aff848a61","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLWi_NDDS5SPkT1gJIEHUwAACJU","detail":{}},"uuid":"a260e500-24df-11ee-8073-6d8fc5930bce","version":"0","request":{"ipChain":[{"ip":"226.185.217.144","geographicalContext":{"city":"Rowland Heights","state":"California","country":"United States","postalCode":"91748","geolocation":{"lat":33.9854,"lon":-117.8972}},"version":"V4","source":null}]},"target":[{"id":"laeaevm1cPlUvf3JO696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kc912sW7u7s0x697","type":"AppInstance","alternateId":"nCino","displayName":"nCino","detailEntry":null}]}} ::: program=CHROME ::: clientIP=226.185.217.144 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-07-17T20:22:21.563Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Wenda Yee | Portfolio Management\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhx2d5xlR4wXX697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:59.000Z\",\"activated\":\"2022-09-27T14:53:59.000Z\",\"statusChanged\":\"2023-06-20T14:50:57.000Z\",\"lastLogin\":\"2023-07-17T20:24:18.000Z\",\"lastUpdated\":\"2023-06-20T14:50:57.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Wenda\",\"lastName\":\"Yee\",\"primaryPhone\":\"(949) 345-7663\",\"immutableID\":\"8cSuYJVyTEWjgfxvV8p2CQ==\",\"mobilePhone\":null,\"displayName\":\"Wenda Yee\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Portfolio Manager\",\"department\":\"Portfolio Management\",\"login\":\"charlie\",\"email\":\"charlie\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697\"},\"resetFactors\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhx2d5xlR4wXX697\",\"type\":\"User\",\"alternateId\":\"charlie\",\"displayName\":\"Wenda Yee\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36\",\"os\":\"Windows 10\",\"browser\":\"CHROME\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"226.185.217.144\",\"geographicalContext\":{\"city\":\"Rowland Heights\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"91748\",\"geolocation\":{\"lat\":33.9854,\"lon\":-117.8972}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxYW6g7Ak_Tia_Zb002eFu-Q\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-07-17T20:22:21.563Z\",\"securityContext\":{\"asNumber\":20001,\"asOrg\":\"charter communications inc\",\"isp\":\"charter communications inc\",\"domain\":\"rr.com\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZLWi9BMA607PldfRdOkVuwWAYNERw\",\"deviceFingerprint\":\"7d8df8b5c254a23e1e5c496e09219af3\",\"requestId\":\"ZLWi_NDDS5SPkT1gJIEHUwAACJU\",\"dtHash\":\"28d3d1c7a9957c80f0dccdc96d4190f2bffc3beb6fdbde0d0502b27aff848a61\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZLWi_NDDS5SPkT1gJIEHUwAACJU\",\"detail\":{}},\"uuid\":\"a260e500-24df-11ee-8073-6d8fc5930bce\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"226.185.217.144\",\"geographicalContext\":{\"city\":\"Rowland Heights\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"91748\",\"geolocation\":{\"lat\":33.9854,\"lon\":-117.8972}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevm1cPlUvf3JO696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa2kc912sW7u7s0x697\",\"type\":\"AppInstance\",\"alternateId\":\"nCino\",\"displayName\":\"nCino\",\"detailEntry\":null}]}} ::: program=CHROME ::: clientIP=226.185.217.144 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-07-17T20:22:21.563Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "CHROME",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"userDisplay=Wenda Yee | Portfolio Management",
"description=User login to Okta",
"auth_failure"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "226.185.217.144",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Wenda Yee | Portfolio Management","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhx2d5xlR4wXX697","status":"ACTIVE","created":"2022-09-27T14:53:59.000Z","activated":"2022-09-27T14:53:59.000Z","statusChanged":"2023-06-20T14:50:57.000Z","lastLogin":"2023-07-17T20:24:18.000Z","lastUpdated":"2023-06-20T14:50:57.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Wenda","lastName":"Yee","primaryPhone":"(949) 345-7663","immutableID":"8cSuYJVyTEWjgfxvV8p2CQ==","mobilePhone":null,"displayName":"Wenda Yee","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"Portfolio Management","login":"charlie","email":"charlie"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhx2d5xlR4wXX697","type":"User","alternateId":"charlie","displayName":"Wenda Yee","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36","os":"Windows 10","browser":"CHROME"},"zone":"null","device":"Computer","id":null,"ipAddress":"226.185.217.144","geographicalContext":{"city":"Rowland Heights","state":"California","country":"United States","postalCode":"91748","geolocation":{"lat":33.9854,"lon":-117.8972}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxYW6g7Ak_Tia_Zb002eFu-Q"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-17T20:22:21.563Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLWi9BMA607PldfRdOkVuwWAYNERw","deviceFingerprint":"7d8df8b5c254a23e1e5c496e09219af3","requestId":"ZLWi_NDDS5SPkT1gJIEHUwAACJU","dtHash":"28d3d1c7a9957c80f0dccdc96d4190f2bffc3beb6fdbde0d0502b27aff848a61","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLWi_NDDS5SPkT1gJIEHUwAACJU","detail":{}},"uuid":"a260e500-24df-11ee-8073-6d8fc5930bce","version":"0","request":{"ipChain":[{"ip":"226.185.217.144","geographicalContext":{"city":"Rowland Heights","state":"California","country":"United States","postalCode":"91748","geolocation":{"lat":33.9854,"lon":-117.8972}},"version":"V4","source":null}]},"target":[{"id":"laeaevm1cPlUvf3JO696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kc912sW7u7s0x697","type":"AppInstance","alternateId":"nCino","displayName":"nCino","detailEntry":null}]}} ::: program=CHROME ::: clientIP=226.185.217.144 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-07-17T20:22:21.563Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Wenda Yee | Portfolio Management","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhx2d5xlR4wXX697","status":"ACTIVE","created":"2022-09-27T14:53:59.000Z","activated":"2022-09-27T14:53:59.000Z","statusChanged":"2023-06-20T14:50:57.000Z","lastLogin":"2023-07-17T20:24:18.000Z","lastUpdated":"2023-06-20T14:50:57.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Wenda","lastName":"Yee","primaryPhone":"(949) 345-7663","immutableID":"8cSuYJVyTEWjgfxvV8p2CQ==","mobilePhone":null,"displayName":"Wenda Yee","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"Portfolio Management","login":"charlie","email":"charlie"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhx2d5xlR4wXX697","type":"User","alternateId":"charlie","displayName":"Wenda Yee","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36","os":"Windows 10","browser":"CHROME"},"zone":"null","device":"Computer","id":null,"ipAddress":"226.185.217.144","geographicalContext":{"city":"Rowland Heights","state":"California","country":"United States","postalCode":"91748","geolocation":{"lat":33.9854,"lon":-117.8972}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxYW6g7Ak_Tia_Zb002eFu-Q"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-17T20:22:21.563Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLWi9BMA607PldfRdOkVuwWAYNERw","deviceFingerprint":"7d8df8b5c254a23e1e5c496e09219af3","requestId":"ZLWi_NDDS5SPkT1gJIEHUwAACJU","dtHash":"28d3d1c7a9957c80f0dccdc96d4190f2bffc3beb6fdbde0d0502b27aff848a61","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLWi_NDDS5SPkT1gJIEHUwAACJU","detail":{}},"uuid":"a260e500-24df-11ee-8073-6d8fc5930bce","version":"0","request":{"ipChain":[{"ip":"226.185.217.144","geographicalContext":{"city":"Rowland Heights","state":"California","country":"United States","postalCode":"91748","geolocation":{"lat":33.9854,"lon":-117.8972}},"version":"V4","source":null}]},"target":[{"id":"laeaevm1cPlUvf3JO696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kc912sW7u7s0x697","type":"AppInstance","alternateId":"nCino","displayName":"nCino","detailEntry":null}]}} ::: program=CHROME ::: clientIP=226.185.217.144 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-07-17T20:22:21.563Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: CHROME
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Wenda Yee | Portfolio Management', 'description=User login to Okta', 'auth_failure']
vendorcode: user.session.start
streamName: Okta
clientIP: 226.185.217.144
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Wenda Yee | Portfolio Management","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhx2d5xlR4wXX697","status":"ACTIVE","created":"2022-09-27T14:53:59.000Z","activated":"2022-09-27T14:53:59.000Z","statusChanged":"2023-06-20T14:50:57.000Z","lastLogin":"2023-07-17T20:24:18.000Z","lastUpdated":"2023-06-20T14:50:57.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Wenda","lastName":"Yee","primaryPhone":"(949) 345-7663","immutableID":"8cSuYJVyTEWjgfxvV8p2CQ==","mobilePhone":null,"displayName":"Wenda Yee","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"Portfolio Management","login":"janedoe","email":"janedoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhx2d5xlR4wXX697","type":"User","alternateId":"janedoe","displayName":"Wenda Yee","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36","os":"Windows 10","browser":"CHROME"},"zone":"null","device":"Computer","id":null,"ipAddress":"195.185.253.61","geographicalContext":{"city":"Rowland Heights","state":"California","country":"United States","postalCode":"91748","geolocation":{"lat":33.9854,"lon":-117.8972}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxYW6g7Ak_Tia_Zb002eFu-Q"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-17T20:22:21.563Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLWi9BMA607PldfRdOkVuwOSCORPRw","deviceFingerprint":"7d8df8b5c254a23e1e5c496e09219af3","requestId":"ZLWi_NDDS5SPkT1gJIEHUwAACJU","dtHash":"28d3d1c7a9957c80f0dccdc96d4190f2bffc3beb6fdbde0d0502b27aff848a61","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLWi_NDDS5SPkT1gJIEHUwAACJU","detail":{}},"uuid":"a260e500-24df-11ee-8073-6d8fc5930bce","version":"0","request":{"ipChain":[{"ip":"195.185.253.61","geographicalContext":{"city":"Rowland Heights","state":"California","country":"United States","postalCode":"91748","geolocation":{"lat":33.9854,"lon":-117.8972}},"version":"V4","source":null}]},"target":[{"id":"laeaevm1cPlUvf3JO696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kc912sW7u7s0x697","type":"AppInstance","alternateId":"nCino","displayName":"nCino","detailEntry":null}]}} ::: program=CHROME ::: clientIP=195.185.253.61 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-07-17T20:22:21.563Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Wenda Yee | Portfolio Management\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhx2d5xlR4wXX697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:59.000Z\",\"activated\":\"2022-09-27T14:53:59.000Z\",\"statusChanged\":\"2023-06-20T14:50:57.000Z\",\"lastLogin\":\"2023-07-17T20:24:18.000Z\",\"lastUpdated\":\"2023-06-20T14:50:57.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Wenda\",\"lastName\":\"Yee\",\"primaryPhone\":\"(949) 345-7663\",\"immutableID\":\"8cSuYJVyTEWjgfxvV8p2CQ==\",\"mobilePhone\":null,\"displayName\":\"Wenda Yee\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Portfolio Manager\",\"department\":\"Portfolio Management\",\"login\":\"janedoe\",\"email\":\"janedoe\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697\"},\"resetFactors\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhx2d5xlR4wXX697\",\"type\":\"User\",\"alternateId\":\"janedoe\",\"displayName\":\"Wenda Yee\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36\",\"os\":\"Windows 10\",\"browser\":\"CHROME\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"195.185.253.61\",\"geographicalContext\":{\"city\":\"Rowland Heights\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"91748\",\"geolocation\":{\"lat\":33.9854,\"lon\":-117.8972}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxYW6g7Ak_Tia_Zb002eFu-Q\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-07-17T20:22:21.563Z\",\"securityContext\":{\"asNumber\":20001,\"asOrg\":\"charter communications inc\",\"isp\":\"charter communications inc\",\"domain\":\"rr.com\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZLWi9BMA607PldfRdOkVuwOSCORPRw\",\"deviceFingerprint\":\"7d8df8b5c254a23e1e5c496e09219af3\",\"requestId\":\"ZLWi_NDDS5SPkT1gJIEHUwAACJU\",\"dtHash\":\"28d3d1c7a9957c80f0dccdc96d4190f2bffc3beb6fdbde0d0502b27aff848a61\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\",\"logOnlySecurityData\":\"{\\\"risk\\\":{\\\"level\\\":\\\"LOW\\\"},\\\"behaviors\\\":{\\\"New Geo-Location\\\":\\\"NEGATIVE\\\",\\\"New Device\\\":\\\"NEGATIVE\\\",\\\"New IP\\\":\\\"NEGATIVE\\\",\\\"New State\\\":\\\"NEGATIVE\\\",\\\"New Country\\\":\\\"NEGATIVE\\\",\\\"Velocity\\\":\\\"NEGATIVE\\\",\\\"New City\\\":\\\"NEGATIVE\\\"}}\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZLWi_NDDS5SPkT1gJIEHUwAACJU\",\"detail\":{}},\"uuid\":\"a260e500-24df-11ee-8073-6d8fc5930bce\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"195.185.253.61\",\"geographicalContext\":{\"city\":\"Rowland Heights\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"91748\",\"geolocation\":{\"lat\":33.9854,\"lon\":-117.8972}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevm1cPlUvf3JO696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa2kc912sW7u7s0x697\",\"type\":\"AppInstance\",\"alternateId\":\"nCino\",\"displayName\":\"nCino\",\"detailEntry\":null}]}} ::: program=CHROME ::: clientIP=195.185.253.61 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-07-17T20:22:21.563Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "CHROME",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"userDisplay=Wenda Yee | Portfolio Management",
"description=User login to Okta",
"auth_failure"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "195.185.253.61",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Wenda Yee | Portfolio Management","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhx2d5xlR4wXX697","status":"ACTIVE","created":"2022-09-27T14:53:59.000Z","activated":"2022-09-27T14:53:59.000Z","statusChanged":"2023-06-20T14:50:57.000Z","lastLogin":"2023-07-17T20:24:18.000Z","lastUpdated":"2023-06-20T14:50:57.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Wenda","lastName":"Yee","primaryPhone":"(949) 345-7663","immutableID":"8cSuYJVyTEWjgfxvV8p2CQ==","mobilePhone":null,"displayName":"Wenda Yee","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"Portfolio Management","login":"janedoe","email":"janedoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhx2d5xlR4wXX697","type":"User","alternateId":"janedoe","displayName":"Wenda Yee","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36","os":"Windows 10","browser":"CHROME"},"zone":"null","device":"Computer","id":null,"ipAddress":"195.185.253.61","geographicalContext":{"city":"Rowland Heights","state":"California","country":"United States","postalCode":"91748","geolocation":{"lat":33.9854,"lon":-117.8972}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxYW6g7Ak_Tia_Zb002eFu-Q"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-17T20:22:21.563Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLWi9BMA607PldfRdOkVuwOSCORPRw","deviceFingerprint":"7d8df8b5c254a23e1e5c496e09219af3","requestId":"ZLWi_NDDS5SPkT1gJIEHUwAACJU","dtHash":"28d3d1c7a9957c80f0dccdc96d4190f2bffc3beb6fdbde0d0502b27aff848a61","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLWi_NDDS5SPkT1gJIEHUwAACJU","detail":{}},"uuid":"a260e500-24df-11ee-8073-6d8fc5930bce","version":"0","request":{"ipChain":[{"ip":"195.185.253.61","geographicalContext":{"city":"Rowland Heights","state":"California","country":"United States","postalCode":"91748","geolocation":{"lat":33.9854,"lon":-117.8972}},"version":"V4","source":null}]},"target":[{"id":"laeaevm1cPlUvf3JO696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kc912sW7u7s0x697","type":"AppInstance","alternateId":"nCino","displayName":"nCino","detailEntry":null}]}} ::: program=CHROME ::: clientIP=195.185.253.61 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-07-17T20:22:21.563Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Wenda Yee | Portfolio Management","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhx2d5xlR4wXX697","status":"ACTIVE","created":"2022-09-27T14:53:59.000Z","activated":"2022-09-27T14:53:59.000Z","statusChanged":"2023-06-20T14:50:57.000Z","lastLogin":"2023-07-17T20:24:18.000Z","lastUpdated":"2023-06-20T14:50:57.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Wenda","lastName":"Yee","primaryPhone":"(949) 345-7663","immutableID":"8cSuYJVyTEWjgfxvV8p2CQ==","mobilePhone":null,"displayName":"Wenda Yee","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"Portfolio Management","login":"janedoe","email":"janedoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhx2d5xlR4wXX697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhx2d5xlR4wXX697","type":"User","alternateId":"janedoe","displayName":"Wenda Yee","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36","os":"Windows 10","browser":"CHROME"},"zone":"null","device":"Computer","id":null,"ipAddress":"195.185.253.61","geographicalContext":{"city":"Rowland Heights","state":"California","country":"United States","postalCode":"91748","geolocation":{"lat":33.9854,"lon":-117.8972}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxYW6g7Ak_Tia_Zb002eFu-Q"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-17T20:22:21.563Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLWi9BMA607PldfRdOkVuwOSCORPRw","deviceFingerprint":"7d8df8b5c254a23e1e5c496e09219af3","requestId":"ZLWi_NDDS5SPkT1gJIEHUwAACJU","dtHash":"28d3d1c7a9957c80f0dccdc96d4190f2bffc3beb6fdbde0d0502b27aff848a61","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?","logOnlySecurityData":"{\"risk\":{\"level\":\"LOW\"},\"behaviors\":{\"New Geo-Location\":\"NEGATIVE\",\"New Device\":\"NEGATIVE\",\"New IP\":\"NEGATIVE\",\"New State\":\"NEGATIVE\",\"New Country\":\"NEGATIVE\",\"Velocity\":\"NEGATIVE\",\"New City\":\"NEGATIVE\"}}"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLWi_NDDS5SPkT1gJIEHUwAACJU","detail":{}},"uuid":"a260e500-24df-11ee-8073-6d8fc5930bce","version":"0","request":{"ipChain":[{"ip":"195.185.253.61","geographicalContext":{"city":"Rowland Heights","state":"California","country":"United States","postalCode":"91748","geolocation":{"lat":33.9854,"lon":-117.8972}},"version":"V4","source":null}]},"target":[{"id":"laeaevm1cPlUvf3JO696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa2kc912sW7u7s0x697","type":"AppInstance","alternateId":"nCino","displayName":"nCino","detailEntry":null}]}} ::: program=CHROME ::: clientIP=195.185.253.61 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-07-17T20:22:21.563Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: CHROME
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Wenda Yee | Portfolio Management', 'description=User login to Okta', 'auth_failure']
vendorcode: user.session.start
streamName: Okta
clientIP: 195.185.253.61
userName: janedoe | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.