input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=10.11.22.1 1 1656663206.548700120 M22_MX67C_Marietta l7_firewall src=156.216.132.99 dst=56.10.228.235 protocol=tcp sport=63395 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1656663206.548700120 M22_MX67C_Marietta l7_firewall src=156.216.132.99 dst=56.10.228.235 protocol=tcp sport=63395 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63395
protocol: 6
streamName: meraki_l7_firewall
clientIP: 156.216.132.99
serverIP: 56.10.228.235 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=211.121.110.246 dst=23.205.166.183 protocol=tcp sport=60294 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=211.121.110.246 dst=23.205.166.183 protocol=tcp sport=60294 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60294,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "211.121.110.246",
"serverIP": "23.205.166.183"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=211.121.110.246 dst=23.205.166.183 protocol=tcp sport=60294 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=211.121.110.246 dst=23.205.166.183 protocol=tcp sport=60294 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60294
protocol: 6
streamName: meraki_l7_firewall
clientIP: 211.121.110.246
serverIP: 23.205.166.183 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=82.250.38.55 dst=10.14.204.194 protocol=tcp sport=60294 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=82.250.38.55 dst=10.14.204.194 protocol=tcp sport=60294 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60294,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "82.250.38.55",
"serverIP": "10.14.204.194"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=82.250.38.55 dst=10.14.204.194 protocol=tcp sport=60294 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=82.250.38.55 dst=10.14.204.194 protocol=tcp sport=60294 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60294
protocol: 6
streamName: meraki_l7_firewall
clientIP: 82.250.38.55
serverIP: 10.14.204.194 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=14.244.218.180 dst=161.247.116.160 protocol=tcp sport=60294 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=14.244.218.180 dst=161.247.116.160 protocol=tcp sport=60294 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60294,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "14.244.218.180",
"serverIP": "161.247.116.160"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=14.244.218.180 dst=161.247.116.160 protocol=tcp sport=60294 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=14.244.218.180 dst=161.247.116.160 protocol=tcp sport=60294 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60294
protocol: 6
streamName: meraki_l7_firewall
clientIP: 14.244.218.180
serverIP: 161.247.116.160 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=219.29.180.17 dst=124.55.253.183 protocol=tcp sport=60294 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=219.29.180.17 dst=124.55.253.183 protocol=tcp sport=60294 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60294,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "219.29.180.17",
"serverIP": "124.55.253.183"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=219.29.180.17 dst=124.55.253.183 protocol=tcp sport=60294 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656663199.376141211 NORDC_MX400_1 l7_firewall src=219.29.180.17 dst=124.55.253.183 protocol=tcp sport=60294 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60294
protocol: 6
streamName: meraki_l7_firewall
clientIP: 219.29.180.17
serverIP: 124.55.253.183 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=238.21.36.83 dst=218.188.156.161 protocol=tcp sport=59161 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=238.21.36.83 dst=218.188.156.161 protocol=tcp sport=59161 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 59161,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "238.21.36.83",
"serverIP": "218.188.156.161"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=238.21.36.83 dst=218.188.156.161 protocol=tcp sport=59161 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=238.21.36.83 dst=218.188.156.161 protocol=tcp sport=59161 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 59161
protocol: 6
streamName: meraki_l7_firewall
clientIP: 238.21.36.83
serverIP: 218.188.156.161 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=24.62.52.6 dst=75.238.245.191 protocol=tcp sport=59161 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=24.62.52.6 dst=75.238.245.191 protocol=tcp sport=59161 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 59161,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "24.62.52.6",
"serverIP": "75.238.245.191"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=24.62.52.6 dst=75.238.245.191 protocol=tcp sport=59161 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=24.62.52.6 dst=75.238.245.191 protocol=tcp sport=59161 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 59161
protocol: 6
streamName: meraki_l7_firewall
clientIP: 24.62.52.6
serverIP: 75.238.245.191 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=133.139.42.2 dst=64.88.252.255 protocol=tcp sport=59161 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=133.139.42.2 dst=64.88.252.255 protocol=tcp sport=59161 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 59161,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "133.139.42.2",
"serverIP": "64.88.252.255"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=133.139.42.2 dst=64.88.252.255 protocol=tcp sport=59161 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=133.139.42.2 dst=64.88.252.255 protocol=tcp sport=59161 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 59161
protocol: 6
streamName: meraki_l7_firewall
clientIP: 133.139.42.2
serverIP: 64.88.252.255 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=158.135.52.250 dst=65.70.24.128 protocol=tcp sport=59161 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=158.135.52.250 dst=65.70.24.128 protocol=tcp sport=59161 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 59161,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "158.135.52.250",
"serverIP": "65.70.24.128"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=158.135.52.250 dst=65.70.24.128 protocol=tcp sport=59161 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1656663210.685503609 M24_MX67C_ForestPark l7_firewall src=158.135.52.250 dst=65.70.24.128 protocol=tcp sport=59161 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 59161
protocol: 6
streamName: meraki_l7_firewall
clientIP: 158.135.52.250
serverIP: 65.70.24.128 | Explain this syslog message |
<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=114.25.248.137 dst=58.243.125.254 protocol=tcp sport=63778 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=114.25.248.137 dst=58.243.125.254 protocol=tcp sport=63778 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63778,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "114.25.248.137",
"serverIP": "58.243.125.254"
} | Create a JSON artifact from the message |
<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=114.25.248.137 dst=58.243.125.254 protocol=tcp sport=63778 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=114.25.248.137 dst=58.243.125.254 protocol=tcp sport=63778 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63778
protocol: 6
streamName: meraki_l7_firewall
clientIP: 114.25.248.137
serverIP: 58.243.125.254 | Explain this syslog message |
<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=45.2.185.250 dst=219.239.36.50 protocol=tcp sport=63778 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=45.2.185.250 dst=219.239.36.50 protocol=tcp sport=63778 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63778,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "45.2.185.250",
"serverIP": "219.239.36.50"
} | Create a JSON artifact from the message |
<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=45.2.185.250 dst=219.239.36.50 protocol=tcp sport=63778 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=45.2.185.250 dst=219.239.36.50 protocol=tcp sport=63778 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63778
protocol: 6
streamName: meraki_l7_firewall
clientIP: 45.2.185.250
serverIP: 219.239.36.50 | Explain this syslog message |
<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=180.65.53.70 dst=247.1.210.128 protocol=tcp sport=63778 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=180.65.53.70 dst=247.1.210.128 protocol=tcp sport=63778 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63778,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "180.65.53.70",
"serverIP": "247.1.210.128"
} | Create a JSON artifact from the message |
<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=180.65.53.70 dst=247.1.210.128 protocol=tcp sport=63778 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=180.65.53.70 dst=247.1.210.128 protocol=tcp sport=63778 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63778
protocol: 6
streamName: meraki_l7_firewall
clientIP: 180.65.53.70
serverIP: 247.1.210.128 | Explain this syslog message |
<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=239.117.23.92 dst=235.232.214.68 protocol=tcp sport=63778 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=239.117.23.92 dst=235.232.214.68 protocol=tcp sport=63778 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63778,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "239.117.23.92",
"serverIP": "235.232.214.68"
} | Create a JSON artifact from the message |
<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=239.117.23.92 dst=235.232.214.68 protocol=tcp sport=63778 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.86.241.61 1 1656612235.848126285 H171_MX67C_HoldenPTC l7_firewall src=239.117.23.92 dst=235.232.214.68 protocol=tcp sport=63778 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63778
protocol: 6
streamName: meraki_l7_firewall
clientIP: 239.117.23.92
serverIP: 235.232.214.68 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T16:23:27.151Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T16:23:27.900Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t199.179.6.156\n\tSource Port:\t\t39218\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"199.179.6.156","IpPort":"39218","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":14416}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6121782850,"task":"Logon"}} | {
"action": "Logon",
"clientport": 39218,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-26T16:23:27.151Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-26T16:23:27.900Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t199.179.6.156\\n\\tSource Port:\\t\\t39218\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"199.179.6.156\",\"IpPort\":\"39218\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":14416}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6121782850,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6121782850",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "199.179.6.156",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T16:23:27.151Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T16:23:27.900Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t199.179.6.156\n\tSource Port:\t\t39218\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"199.179.6.156","IpPort":"39218","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":14416}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6121782850,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T16:23:27.151Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T16:23:27.900Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t199.179.6.156\n\tSource Port:\t\t39218\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"199.179.6.156","IpPort":"39218","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":14416}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6121782850,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 39218
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6121782850
streamName: microsoft-windows-security-auditing
clientIP: 199.179.6.156
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T16:23:27.151Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T16:23:27.900Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t165.12.124.15\n\tSource Port:\t\t39218\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"165.12.124.15","IpPort":"39218","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":14416}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6121782850,"task":"Logon"}} | {
"action": "Logon",
"clientport": 39218,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-26T16:23:27.151Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-26T16:23:27.900Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t165.12.124.15\\n\\tSource Port:\\t\\t39218\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"165.12.124.15\",\"IpPort\":\"39218\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":14416}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6121782850,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6121782850",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "165.12.124.15",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T16:23:27.151Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T16:23:27.900Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t165.12.124.15\n\tSource Port:\t\t39218\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"165.12.124.15","IpPort":"39218","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":14416}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6121782850,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T16:23:27.151Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T16:23:27.900Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t165.12.124.15\n\tSource Port:\t\t39218\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"165.12.124.15","IpPort":"39218","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":14416}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6121782850,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 39218
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6121782850
streamName: microsoft-windows-security-auditing
clientIP: 165.12.124.15
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T16:23:27.151Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T16:23:27.900Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t234.33.196.65\n\tSource Port:\t\t39218\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"234.33.196.65","IpPort":"39218","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":14416}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6121782850,"task":"Logon"}} | {
"action": "Logon",
"clientport": 39218,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-26T16:23:27.151Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-26T16:23:27.900Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t234.33.196.65\\n\\tSource Port:\\t\\t39218\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"234.33.196.65\",\"IpPort\":\"39218\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":14416}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6121782850,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6121782850",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "234.33.196.65",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T16:23:27.151Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T16:23:27.900Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t234.33.196.65\n\tSource Port:\t\t39218\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"234.33.196.65","IpPort":"39218","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":14416}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6121782850,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T16:23:27.151Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T16:23:27.900Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t234.33.196.65\n\tSource Port:\t\t39218\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"234.33.196.65","IpPort":"39218","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":14416}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6121782850,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 39218
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6121782850
streamName: microsoft-windows-security-auditing
clientIP: 234.33.196.65
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T16:23:27.151Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T16:23:27.900Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t137.216.254.190\n\tSource Port:\t\t39218\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"137.216.254.190","IpPort":"39218","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":14416}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6121782850,"task":"Logon"}} | {
"action": "Logon",
"clientport": 39218,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-26T16:23:27.151Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-26T16:23:27.900Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t137.216.254.190\\n\\tSource Port:\\t\\t39218\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"137.216.254.190\",\"IpPort\":\"39218\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":14416}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6121782850,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6121782850",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "137.216.254.190",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T16:23:27.151Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T16:23:27.900Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t137.216.254.190\n\tSource Port:\t\t39218\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"137.216.254.190","IpPort":"39218","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":14416}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6121782850,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T16:23:27.151Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T16:23:27.900Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t137.216.254.190\n\tSource Port:\t\t39218\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"137.216.254.190","IpPort":"39218","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":14416}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6121782850,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 39218
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6121782850
streamName: microsoft-windows-security-auditing
clientIP: 137.216.254.190
userName: charlie | Explain this syslog message |
<134>Oct 1 19:04:41 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1000608|Generic SQL Injection Prevention|10|cn1=36301 cn1Label=Host ID dvc=58.0.223.214 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=42.214.225.187 dst=58.0.223.214 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=4510 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=11 act=Log cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="SQL Injection" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 80,
"severitylabel": "emergency",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Generic SQL Injection Prevention",
"DPI Note:SQL Injection",
"Generic SQL Injection Prevention",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"sourceinfo": "unknown",
"message": "<134>Oct 1 19:04:41 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1000608|Generic SQL Injection Prevention|10|cn1=36301 cn1Label=Host ID dvc=58.0.223.214 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=42.214.225.187 dst=58.0.223.214 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=4510 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=11 act=Log cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"SQL Injection\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 1 19:04:41",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Generic SQL Injection Prevention",
"servermac": "0AF8BFA918F3",
"clientmac": "0A504606F981",
"clientport": 4510,
"vendorcode": "1000608",
"action": "Log",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "42.214.225.187",
"serverIP": "58.0.223.214"
} | Create a JSON artifact from the message |
<134>Oct 1 19:04:41 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1000608|Generic SQL Injection Prevention|10|cn1=36301 cn1Label=Host ID dvc=58.0.223.214 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=42.214.225.187 dst=58.0.223.214 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=4510 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=11 act=Log cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="SQL Injection" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 1 19:04:41 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1000608|Generic SQL Injection Prevention|10|cn1=36301 cn1Label=Host ID dvc=58.0.223.214 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=42.214.225.187 dst=58.0.223.214 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=4510 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=11 act=Log cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="SQL Injection" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 80
severitylabel: emergency
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Generic SQL Injection Prevention', 'DPI Note:SQL Injection', 'Generic SQL Injection Prevention', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
sourceinfo: unknown
localstarttime: Oct 1 19:04:41
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Generic SQL Injection Prevention
servermac: 0AF8BFA918F3
clientmac: 0A504606F981
clientport: 4510
vendorcode: 1000608
action: Log
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 42.214.225.187
serverIP: 58.0.223.214 | Explain this syslog message |
<134>Oct 1 19:07:02 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1006434|Microsoft IIS Directory Traversal Vulnerability|8|cn1=36301 cn1Label=Host ID dvc=215.158.172.232 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=164.13.14.148 dst=215.158.172.232 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1350 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=4 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2001-0333" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 80,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK PSH",
"rfc3164",
"Fragmentation Bits:DF 0",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position :0",
"cef",
"Microsoft IIS Directory Traversal Vulnerability",
"trend micro_deep security agent_Microsoft IIS Directory Traversal Vulnerability",
"DPI Note:CVE-2001-0333"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Oct 1 19:07:02 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1006434|Microsoft IIS Directory Traversal Vulnerability|8|cn1=36301 cn1Label=Host ID dvc=215.158.172.232 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=164.13.14.148 dst=215.158.172.232 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1350 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=4 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2001-0333\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 1 19:07:02",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Microsoft IIS Directory Traversal Vulnerability",
"servermac": "0AF8BFA918F3",
"clientmac": "0A504606F981",
"clientport": 1350,
"vendorcode": "1006434",
"action": "Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "164.13.14.148",
"serverIP": "215.158.172.232"
} | Create a JSON artifact from the message |
<134>Oct 1 19:07:02 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1006434|Microsoft IIS Directory Traversal Vulnerability|8|cn1=36301 cn1Label=Host ID dvc=215.158.172.232 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=164.13.14.148 dst=215.158.172.232 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1350 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=4 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2001-0333" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 1 19:07:02 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1006434|Microsoft IIS Directory Traversal Vulnerability|8|cn1=36301 cn1Label=Host ID dvc=215.158.172.232 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=164.13.14.148 dst=215.158.172.232 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1350 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=4 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2001-0333" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 80
severitylabel: critical
tags: ['TCP Flags:ACK PSH', 'rfc3164', 'Fragmentation Bits:DF 0', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0', 'cef', 'Microsoft IIS Directory Traversal Vulnerability', 'trend micro_deep security agent_Microsoft IIS Directory Traversal Vulnerability', 'DPI Note:CVE-2001-0333']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Oct 1 19:07:02
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Microsoft IIS Directory Traversal Vulnerability
servermac: 0AF8BFA918F3
clientmac: 0A504606F981
clientport: 1350
vendorcode: 1006434
action: Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 164.13.14.148
serverIP: 215.158.172.232 | Explain this syslog message |
<134>Oct 1 19:04:41 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1000608|Generic SQL Injection Prevention|10|cn1=36301 cn1Label=Host ID dvc=104.149.196.125 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=83.223.180.135 dst=104.149.196.125 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=4510 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=11 act=Log cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="SQL Injection" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 80,
"severitylabel": "emergency",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Generic SQL Injection Prevention",
"DPI Note:SQL Injection",
"Generic SQL Injection Prevention",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"sourceinfo": "unknown",
"message": "<134>Oct 1 19:04:41 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1000608|Generic SQL Injection Prevention|10|cn1=36301 cn1Label=Host ID dvc=104.149.196.125 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=83.223.180.135 dst=104.149.196.125 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=4510 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=11 act=Log cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"SQL Injection\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 1 19:04:41",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Generic SQL Injection Prevention",
"servermac": "0AF8BFA918F3",
"clientmac": "0A504606F981",
"clientport": 4510,
"vendorcode": "1000608",
"action": "Log",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "83.223.180.135",
"serverIP": "104.149.196.125"
} | Create a JSON artifact from the message |
<134>Oct 1 19:04:41 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1000608|Generic SQL Injection Prevention|10|cn1=36301 cn1Label=Host ID dvc=104.149.196.125 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=83.223.180.135 dst=104.149.196.125 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=4510 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=11 act=Log cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="SQL Injection" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 1 19:04:41 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1000608|Generic SQL Injection Prevention|10|cn1=36301 cn1Label=Host ID dvc=104.149.196.125 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=83.223.180.135 dst=104.149.196.125 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=4510 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=11 act=Log cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="SQL Injection" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 80
severitylabel: emergency
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Generic SQL Injection Prevention', 'DPI Note:SQL Injection', 'Generic SQL Injection Prevention', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
sourceinfo: unknown
localstarttime: Oct 1 19:04:41
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Generic SQL Injection Prevention
servermac: 0AF8BFA918F3
clientmac: 0A504606F981
clientport: 4510
vendorcode: 1000608
action: Log
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 83.223.180.135
serverIP: 104.149.196.125 | Explain this syslog message |
<134>Oct 1 19:07:02 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1006434|Microsoft IIS Directory Traversal Vulnerability|8|cn1=36301 cn1Label=Host ID dvc=6.86.39.9 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=212.197.102.89 dst=6.86.39.9 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1350 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=4 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2001-0333" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 80,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK PSH",
"rfc3164",
"Fragmentation Bits:DF 0",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position :0",
"cef",
"Microsoft IIS Directory Traversal Vulnerability",
"trend micro_deep security agent_Microsoft IIS Directory Traversal Vulnerability",
"DPI Note:CVE-2001-0333"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Oct 1 19:07:02 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1006434|Microsoft IIS Directory Traversal Vulnerability|8|cn1=36301 cn1Label=Host ID dvc=6.86.39.9 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=212.197.102.89 dst=6.86.39.9 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1350 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=4 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"CVE-2001-0333\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 1 19:07:02",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Microsoft IIS Directory Traversal Vulnerability",
"servermac": "0AF8BFA918F3",
"clientmac": "0A504606F981",
"clientport": 1350,
"vendorcode": "1006434",
"action": "Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "212.197.102.89",
"serverIP": "6.86.39.9"
} | Create a JSON artifact from the message |
<134>Oct 1 19:07:02 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1006434|Microsoft IIS Directory Traversal Vulnerability|8|cn1=36301 cn1Label=Host ID dvc=6.86.39.9 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=212.197.102.89 dst=6.86.39.9 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1350 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=4 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2001-0333" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 1 19:07:02 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1006434|Microsoft IIS Directory Traversal Vulnerability|8|cn1=36301 cn1Label=Host ID dvc=6.86.39.9 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:F8:BF:A9:18:F3 smac=0A:50:46:06:F9:81 TrendMicroDsFrameType=IP src=212.197.102.89 dst=6.86.39.9 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1350 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=4 act=Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="CVE-2001-0333" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 80
severitylabel: critical
tags: ['TCP Flags:ACK PSH', 'rfc3164', 'Fragmentation Bits:DF 0', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0', 'cef', 'Microsoft IIS Directory Traversal Vulnerability', 'trend micro_deep security agent_Microsoft IIS Directory Traversal Vulnerability', 'DPI Note:CVE-2001-0333']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Oct 1 19:07:02
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Microsoft IIS Directory Traversal Vulnerability
servermac: 0AF8BFA918F3
clientmac: 0A504606F981
clientport: 1350
vendorcode: 1006434
action: Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 212.197.102.89
serverIP: 6.86.39.9 | Explain this syslog message |
<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=156.131.14.34 dst=53.245.41.50 protocol=tcp sport=57073 dport=443 decision=blocked | {
"action": "block",
"clientport": 57073,
"message": "<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=156.131.14.34 dst=53.245.41.50 protocol=tcp sport=57073 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "156.131.14.34",
"serverIP": "53.245.41.50"
} | Create a JSON artifact from the message |
<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=156.131.14.34 dst=53.245.41.50 protocol=tcp sport=57073 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=156.131.14.34 dst=53.245.41.50 protocol=tcp sport=57073 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57073
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 156.131.14.34
serverIP: 53.245.41.50 | Explain this syslog message |
<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=168.23.72.182 dst=190.248.29.241 protocol=tcp sport=57073 dport=443 decision=blocked | {
"action": "block",
"clientport": 57073,
"message": "<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=168.23.72.182 dst=190.248.29.241 protocol=tcp sport=57073 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "168.23.72.182",
"serverIP": "190.248.29.241"
} | Create a JSON artifact from the message |
<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=168.23.72.182 dst=190.248.29.241 protocol=tcp sport=57073 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=168.23.72.182 dst=190.248.29.241 protocol=tcp sport=57073 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57073
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 168.23.72.182
serverIP: 190.248.29.241 | Explain this syslog message |
<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=177.67.205.31 dst=225.41.140.33 protocol=tcp sport=57073 dport=443 decision=blocked | {
"action": "block",
"clientport": 57073,
"message": "<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=177.67.205.31 dst=225.41.140.33 protocol=tcp sport=57073 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "177.67.205.31",
"serverIP": "225.41.140.33"
} | Create a JSON artifact from the message |
<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=177.67.205.31 dst=225.41.140.33 protocol=tcp sport=57073 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=177.67.205.31 dst=225.41.140.33 protocol=tcp sport=57073 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57073
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 177.67.205.31
serverIP: 225.41.140.33 | Explain this syslog message |
<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=90.38.162.138 dst=213.1.58.48 protocol=tcp sport=57073 dport=443 decision=blocked | {
"action": "block",
"clientport": 57073,
"message": "<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=90.38.162.138 dst=213.1.58.48 protocol=tcp sport=57073 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "90.38.162.138",
"serverIP": "213.1.58.48"
} | Create a JSON artifact from the message |
<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=90.38.162.138 dst=213.1.58.48 protocol=tcp sport=57073 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.4.233.194 1 1690555751.364187214 M27_MX67C_Newnan l7_firewall src=90.38.162.138 dst=213.1.58.48 protocol=tcp sport=57073 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57073
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 90.38.162.138
serverIP: 213.1.58.48 | Explain this syslog message |
<185>Jun 5 05:21:57 WAFirewall CEF:0|Barracuda|WAF|1220|152|METOSCORPARACTER_IN_PARAMETER|1|cat=WF dst=23.113.104.141 dpt=443 act=DENY msg=[token\="%00 " Parameter\="skin" value\="../../../../../../../../../etc/passwd"] duser="-" src=101.255.253.240 spt=44174 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 05 2024 05:21:57 rt=1717582917452 request=/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Safari/605.1.15" dvchost=WAFirewall externalId=18fe7eb6f4b-dec909e5 cn2=44174 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Other Attacks cs4Label=AttackGroup cs5=101.255.253.240 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44174,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz",
"localhostname": "WAFirewall",
"localstarttime": "1717582917452 ",
"message": "<185>Jun 5 05:21:57 WAFirewall CEF:0|Barracuda|WAF|1220|152|METOSCORPARACTER_IN_PARAMETER|1|cat=WF dst=23.113.104.141 dpt=443 act=DENY msg=[token\\=\"%00 \" Parameter\\=\"skin\" value\\=\"../../../../../../../../../etc/passwd\"] duser=\"-\" src=101.255.253.240 spt=44174 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 05 2024 05:21:57 rt=1717582917452 request=/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Safari/605.1.15\" dvchost=WAFirewall externalId=18fe7eb6f4b-dec909e5 cn2=44174 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Other Attacks cs4Label=AttackGroup cs5=101.255.253.240 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "METACHARACTER_IN_PARAMETER",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"barracuda_waf_METACHARACTER_IN_PARAMETER",
"AttackGroup:Other Attacks",
"cef",
"ProxyIP:64.23.234.67",
"RuleID:security-policy",
"SessionID:-",
"METACHARACTER_IN_PARAMETER",
"FollowUpAction:NONE"
],
"vendorcode": "152",
"streamName": "barracuda_waf",
"clientIP": "101.255.253.240",
"serverIP": "23.113.104.141",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 5 05:21:57 WAFirewall CEF:0|Barracuda|WAF|1220|152|METOSCORPARACTER_IN_PARAMETER|1|cat=WF dst=23.113.104.141 dpt=443 act=DENY msg=[token\="%00 " Parameter\="skin" value\="../../../../../../../../../etc/passwd"] duser="-" src=101.255.253.240 spt=44174 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 05 2024 05:21:57 rt=1717582917452 request=/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Safari/605.1.15" dvchost=WAFirewall externalId=18fe7eb6f4b-dec909e5 cn2=44174 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Other Attacks cs4Label=AttackGroup cs5=101.255.253.240 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 5 05:21:57 WAFirewall CEF:0|Barracuda|WAF|1220|152|METOSCORPARACTER_IN_PARAMETER|1|cat=WF dst=23.113.104.141 dpt=443 act=DENY msg=[token\="%00 " Parameter\="skin" value\="../../../../../../../../../etc/passwd"] duser="-" src=101.255.253.240 spt=44174 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 05 2024 05:21:57 rt=1717582917452 request=/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Safari/605.1.15" dvchost=WAFirewall externalId=18fe7eb6f4b-dec909e5 cn2=44174 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Other Attacks cs4Label=AttackGroup cs5=101.255.253.240 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44174
facilitycode: 23
facilitylabel: local7
fqdn: /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz
localhostname: WAFirewall
localstarttime: 1717582917452
messagetype: METACHARACTER_IN_PARAMETER
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'barracuda_waf_METACHARACTER_IN_PARAMETER', 'AttackGroup:Other Attacks', 'cef', 'ProxyIP:64.23.234.67', 'RuleID:security-policy', 'SessionID:-', 'METACHARACTER_IN_PARAMETER', 'FollowUpAction:NONE']
vendorcode: 152
streamName: barracuda_waf
clientIP: 101.255.253.240
serverIP: 23.113.104.141
userName: - | Explain this syslog message |
<185>Jun 5 05:21:57 WAFirewall CEF:0|Barracuda|WAF|1220|152|METOSCORPARACTER_IN_PARAMETER|1|cat=WF dst=71.101.54.136 dpt=443 act=DENY msg=[token\="%00 " Parameter\="skin" value\="../../../../../../../../../etc/passwd"] duser="-" src=30.179.215.193 spt=44174 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 05 2024 05:21:57 rt=1717582917452 request=/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Safari/605.1.15" dvchost=WAFirewall externalId=18fe7eb6f4b-dec909e5 cn2=44174 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Other Attacks cs4Label=AttackGroup cs5=30.179.215.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44174,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz",
"localhostname": "WAFirewall",
"localstarttime": "1717582917452 ",
"message": "<185>Jun 5 05:21:57 WAFirewall CEF:0|Barracuda|WAF|1220|152|METOSCORPARACTER_IN_PARAMETER|1|cat=WF dst=71.101.54.136 dpt=443 act=DENY msg=[token\\=\"%00 \" Parameter\\=\"skin\" value\\=\"../../../../../../../../../etc/passwd\"] duser=\"-\" src=30.179.215.193 spt=44174 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 05 2024 05:21:57 rt=1717582917452 request=/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Safari/605.1.15\" dvchost=WAFirewall externalId=18fe7eb6f4b-dec909e5 cn2=44174 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Other Attacks cs4Label=AttackGroup cs5=30.179.215.193 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "METACHARACTER_IN_PARAMETER",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"barracuda_waf_METACHARACTER_IN_PARAMETER",
"AttackGroup:Other Attacks",
"cef",
"ProxyIP:64.23.234.67",
"RuleID:security-policy",
"SessionID:-",
"METACHARACTER_IN_PARAMETER",
"FollowUpAction:NONE"
],
"vendorcode": "152",
"streamName": "barracuda_waf",
"clientIP": "30.179.215.193",
"serverIP": "71.101.54.136",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 5 05:21:57 WAFirewall CEF:0|Barracuda|WAF|1220|152|METOSCORPARACTER_IN_PARAMETER|1|cat=WF dst=71.101.54.136 dpt=443 act=DENY msg=[token\="%00 " Parameter\="skin" value\="../../../../../../../../../etc/passwd"] duser="-" src=30.179.215.193 spt=44174 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 05 2024 05:21:57 rt=1717582917452 request=/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Safari/605.1.15" dvchost=WAFirewall externalId=18fe7eb6f4b-dec909e5 cn2=44174 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Other Attacks cs4Label=AttackGroup cs5=30.179.215.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 5 05:21:57 WAFirewall CEF:0|Barracuda|WAF|1220|152|METOSCORPARACTER_IN_PARAMETER|1|cat=WF dst=71.101.54.136 dpt=443 act=DENY msg=[token\="%00 " Parameter\="skin" value\="../../../../../../../../../etc/passwd"] duser="-" src=30.179.215.193 spt=44174 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 05 2024 05:21:57 rt=1717582917452 request=/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Safari/605.1.15" dvchost=WAFirewall externalId=18fe7eb6f4b-dec909e5 cn2=44174 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Other Attacks cs4Label=AttackGroup cs5=30.179.215.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44174
facilitycode: 23
facilitylabel: local7
fqdn: /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz
localhostname: WAFirewall
localstarttime: 1717582917452
messagetype: METACHARACTER_IN_PARAMETER
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'barracuda_waf_METACHARACTER_IN_PARAMETER', 'AttackGroup:Other Attacks', 'cef', 'ProxyIP:64.23.234.67', 'RuleID:security-policy', 'SessionID:-', 'METACHARACTER_IN_PARAMETER', 'FollowUpAction:NONE']
vendorcode: 152
streamName: barracuda_waf
clientIP: 30.179.215.193
serverIP: 71.101.54.136
userName: - | Explain this syslog message |
<185>Jun 5 05:21:57 WAFirewall CEF:0|Barracuda|WAF|1220|152|METUMBRELLAARACTER_IN_PARAMETER|1|cat=WF dst=75.252.170.33 dpt=443 act=DENY msg=[token\="%00 " Parameter\="skin" value\="../../../../../../../../../etc/passwd"] duser="-" src=247.195.93.249 spt=44174 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 05 2024 05:21:57 rt=1717582917452 request=/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Safari/605.1.15" dvchost=WAFirewall externalId=18fe7eb6f4b-dec909e5 cn2=44174 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Other Attacks cs4Label=AttackGroup cs5=247.195.93.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44174,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz",
"localhostname": "WAFirewall",
"localstarttime": "1717582917452 ",
"message": "<185>Jun 5 05:21:57 WAFirewall CEF:0|Barracuda|WAF|1220|152|METUMBRELLAARACTER_IN_PARAMETER|1|cat=WF dst=75.252.170.33 dpt=443 act=DENY msg=[token\\=\"%00 \" Parameter\\=\"skin\" value\\=\"../../../../../../../../../etc/passwd\"] duser=\"-\" src=247.195.93.249 spt=44174 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 05 2024 05:21:57 rt=1717582917452 request=/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Safari/605.1.15\" dvchost=WAFirewall externalId=18fe7eb6f4b-dec909e5 cn2=44174 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Other Attacks cs4Label=AttackGroup cs5=247.195.93.249 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "METACHARACTER_IN_PARAMETER",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"barracuda_waf_METACHARACTER_IN_PARAMETER",
"AttackGroup:Other Attacks",
"cef",
"ProxyIP:64.23.234.67",
"RuleID:security-policy",
"SessionID:-",
"METACHARACTER_IN_PARAMETER",
"FollowUpAction:NONE"
],
"vendorcode": "152",
"streamName": "barracuda_waf",
"clientIP": "247.195.93.249",
"serverIP": "75.252.170.33",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 5 05:21:57 WAFirewall CEF:0|Barracuda|WAF|1220|152|METUMBRELLAARACTER_IN_PARAMETER|1|cat=WF dst=75.252.170.33 dpt=443 act=DENY msg=[token\="%00 " Parameter\="skin" value\="../../../../../../../../../etc/passwd"] duser="-" src=247.195.93.249 spt=44174 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 05 2024 05:21:57 rt=1717582917452 request=/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Safari/605.1.15" dvchost=WAFirewall externalId=18fe7eb6f4b-dec909e5 cn2=44174 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Other Attacks cs4Label=AttackGroup cs5=247.195.93.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 5 05:21:57 WAFirewall CEF:0|Barracuda|WAF|1220|152|METUMBRELLAARACTER_IN_PARAMETER|1|cat=WF dst=75.252.170.33 dpt=443 act=DENY msg=[token\="%00 " Parameter\="skin" value\="../../../../../../../../../etc/passwd"] duser="-" src=247.195.93.249 spt=44174 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 05 2024 05:21:57 rt=1717582917452 request=/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Safari/605.1.15" dvchost=WAFirewall externalId=18fe7eb6f4b-dec909e5 cn2=44174 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Other Attacks cs4Label=AttackGroup cs5=247.195.93.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44174
facilitycode: 23
facilitylabel: local7
fqdn: /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz
localhostname: WAFirewall
localstarttime: 1717582917452
messagetype: METACHARACTER_IN_PARAMETER
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'barracuda_waf_METACHARACTER_IN_PARAMETER', 'AttackGroup:Other Attacks', 'cef', 'ProxyIP:64.23.234.67', 'RuleID:security-policy', 'SessionID:-', 'METACHARACTER_IN_PARAMETER', 'FollowUpAction:NONE']
vendorcode: 152
streamName: barracuda_waf
clientIP: 247.195.93.249
serverIP: 75.252.170.33
userName: - | Explain this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=165.146.125.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.241.196.19 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.241.196.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 51398,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/owa/auth/logon.aspx",
"localhostname": "WAFirewall",
"localstarttime": "1694073372303 ",
"message": "<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=165.146.125.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=0.241.196.19 spt=51398 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36\" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.241.196.19 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:185.232.67.7",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "0.241.196.19",
"serverIP": "165.146.125.135",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=165.146.125.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.241.196.19 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.241.196.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=165.146.125.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.241.196.19 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.241.196.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 51398
facilitycode: 23
facilitylabel: local7
fqdn: /owa/auth/logon.aspx
localhostname: WAFirewall
localstarttime: 1694073372303
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:185.232.67.7', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 0.241.196.19
serverIP: 165.146.125.135
userName: - | Explain this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=29.64.175.178 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.134.131.94 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.134.131.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 51398,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/owa/auth/logon.aspx",
"localhostname": "WAFirewall",
"localstarttime": "1694073372303 ",
"message": "<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=29.64.175.178 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=131.134.131.94 spt=51398 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36\" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.134.131.94 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:185.232.67.7",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "131.134.131.94",
"serverIP": "29.64.175.178",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=29.64.175.178 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.134.131.94 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.134.131.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=29.64.175.178 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.134.131.94 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.134.131.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 51398
facilitycode: 23
facilitylabel: local7
fqdn: /owa/auth/logon.aspx
localhostname: WAFirewall
localstarttime: 1694073372303
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:185.232.67.7', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 131.134.131.94
serverIP: 29.64.175.178
userName: - | Explain this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=65.173.93.13 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=24.221.160.186 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=24.221.160.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 51398,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/owa/auth/logon.aspx",
"localhostname": "WAFirewall",
"localstarttime": "1694073372303 ",
"message": "<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=65.173.93.13 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=24.221.160.186 spt=51398 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36\" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=24.221.160.186 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:185.232.67.7",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "24.221.160.186",
"serverIP": "65.173.93.13",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=65.173.93.13 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=24.221.160.186 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=24.221.160.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=65.173.93.13 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=24.221.160.186 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=24.221.160.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 51398
facilitycode: 23
facilitylabel: local7
fqdn: /owa/auth/logon.aspx
localhostname: WAFirewall
localstarttime: 1694073372303
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:185.232.67.7', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 24.221.160.186
serverIP: 65.173.93.13
userName: - | Explain this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=142.190.12.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=96.236.217.215 spt=50336 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372311 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2762.73 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e79-dd994017 cn2=50336 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=96.236.217.215 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 50336,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/owa/auth/logon.aspx",
"localhostname": "WAFirewall",
"localstarttime": "1694073372311 ",
"message": "<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=142.190.12.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=96.236.217.215 spt=50336 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 02:56:12 rt=1694073372311 request=/owa/auth/logon.aspx requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2762.73 Safari/537.36\" dvchost=WAFirewall externalId=18a6ea43e79-dd994017 cn2=50336 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=96.236.217.215 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:185.232.67.7",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "96.236.217.215",
"serverIP": "142.190.12.48",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=142.190.12.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=96.236.217.215 spt=50336 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372311 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2762.73 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e79-dd994017 cn2=50336 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=96.236.217.215 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=142.190.12.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=96.236.217.215 spt=50336 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372311 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2762.73 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e79-dd994017 cn2=50336 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=96.236.217.215 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 50336
facilitycode: 23
facilitylabel: local7
fqdn: /owa/auth/logon.aspx
localhostname: WAFirewall
localstarttime: 1694073372311
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:185.232.67.7', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 96.236.217.215
serverIP: 142.190.12.48
userName: - | Explain this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=89.117.114.142 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=126.85.208.190 spt=50336 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372311 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2762.73 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e79-dd994017 cn2=50336 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.85.208.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 50336,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/owa/auth/logon.aspx",
"localhostname": "WAFirewall",
"localstarttime": "1694073372311 ",
"message": "<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=89.117.114.142 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=126.85.208.190 spt=50336 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 02:56:12 rt=1694073372311 request=/owa/auth/logon.aspx requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2762.73 Safari/537.36\" dvchost=WAFirewall externalId=18a6ea43e79-dd994017 cn2=50336 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.85.208.190 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:185.232.67.7",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "126.85.208.190",
"serverIP": "89.117.114.142",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=89.117.114.142 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=126.85.208.190 spt=50336 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372311 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2762.73 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e79-dd994017 cn2=50336 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.85.208.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=89.117.114.142 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=126.85.208.190 spt=50336 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372311 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2762.73 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e79-dd994017 cn2=50336 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.85.208.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 50336
facilitycode: 23
facilitylabel: local7
fqdn: /owa/auth/logon.aspx
localhostname: WAFirewall
localstarttime: 1694073372311
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:185.232.67.7', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 126.85.208.190
serverIP: 89.117.114.142
userName: - | Explain this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=152.146.3.69 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=53.46.192.8 spt=50336 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372311 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2762.73 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e79-dd994017 cn2=50336 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=53.46.192.8 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 50336,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/owa/auth/logon.aspx",
"localhostname": "WAFirewall",
"localstarttime": "1694073372311 ",
"message": "<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=152.146.3.69 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=53.46.192.8 spt=50336 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 02:56:12 rt=1694073372311 request=/owa/auth/logon.aspx requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2762.73 Safari/537.36\" dvchost=WAFirewall externalId=18a6ea43e79-dd994017 cn2=50336 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=53.46.192.8 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:185.232.67.7",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "53.46.192.8",
"serverIP": "152.146.3.69",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=152.146.3.69 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=53.46.192.8 spt=50336 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372311 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2762.73 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e79-dd994017 cn2=50336 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=53.46.192.8 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.