input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"99.226.227.15","externalIp":"10.83.204.58","categories":["Cryptomining"],"tags":[],"destination":"api.aurorapush.cc","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-29T19:35:53.000Z"} ::: clientIP=99.226.227.15 ::: serverIP=10.83.204.58 ::: userName=bob ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "api.aurorapush.cc",
"message": "WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"99.226.227.15\",\"externalIp\":\"10.83.204.58\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"api.aurorapush.cc\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-29T19:35:53.000Z\"} ::: clientIP=99.226.227.15 ::: serverIP=10.83.204.58 ::: userName=bob ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "api.aurorapush.cc",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-29T19:35:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Cryptomining",
"streamName": "OpenDNS Detection",
"clientIP": "99.226.227.15",
"serverIP": "10.83.204.58",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"99.226.227.15","externalIp":"10.83.204.58","categories":["Cryptomining"],"tags":[],"destination":"api.aurorapush.cc","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-29T19:35:53.000Z"} ::: clientIP=99.226.227.15 ::: serverIP=10.83.204.58 ::: userName=bob ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"99.226.227.15","externalIp":"10.83.204.58","categories":["Cryptomining"],"tags":[],"destination":"api.aurorapush.cc","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-29T19:35:53.000Z"} ::: clientIP=99.226.227.15 ::: serverIP=10.83.204.58 ::: userName=bob ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: api.aurorapush.cc
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: api.aurorapush.cc
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-29T19:35:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Cryptomining
streamName: OpenDNS Detection
clientIP: 99.226.227.15
serverIP: 10.83.204.58
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"7.83.19.208","externalIp":"191.235.30.34","categories":["Cryptomining"],"tags":[],"destination":"api.aurorapush.cc","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-29T19:35:53.000Z"} ::: clientIP=7.83.19.208 ::: serverIP=191.235.30.34 ::: userName=fish ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "api.aurorapush.cc",
"message": "WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"7.83.19.208\",\"externalIp\":\"191.235.30.34\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"api.aurorapush.cc\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-29T19:35:53.000Z\"} ::: clientIP=7.83.19.208 ::: serverIP=191.235.30.34 ::: userName=fish ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "api.aurorapush.cc",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-29T19:35:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Cryptomining",
"streamName": "OpenDNS Detection",
"clientIP": "7.83.19.208",
"serverIP": "191.235.30.34",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"7.83.19.208","externalIp":"191.235.30.34","categories":["Cryptomining"],"tags":[],"destination":"api.aurorapush.cc","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-29T19:35:53.000Z"} ::: clientIP=7.83.19.208 ::: serverIP=191.235.30.34 ::: userName=fish ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"7.83.19.208","externalIp":"191.235.30.34","categories":["Cryptomining"],"tags":[],"destination":"api.aurorapush.cc","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-29T19:35:53.000Z"} ::: clientIP=7.83.19.208 ::: serverIP=191.235.30.34 ::: userName=fish ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: api.aurorapush.cc
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: api.aurorapush.cc
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-29T19:35:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Cryptomining
streamName: OpenDNS Detection
clientIP: 7.83.19.208
serverIP: 191.235.30.34
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"36.224.212.78","externalIp":"188.224.0.82","categories":["Malware"],"tags":[],"destination":"graywhalefoundation.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:22:52.000Z"} ::: clientIP=36.224.212.78 ::: serverIP=188.224.0.82 ::: userName=janedoe ::: created_at=2023-04-10T15:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:22:52.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "graywhalefoundation.org",
"message": "WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"36.224.212.78\",\"externalIp\":\"188.224.0.82\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"graywhalefoundation.org\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-10T15:22:52.000Z\"} ::: clientIP=36.224.212.78 ::: serverIP=188.224.0.82 ::: userName=janedoe ::: created_at=2023-04-10T15:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:22:52.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "graywhalefoundation.org",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-10T15:22:52.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "36.224.212.78",
"serverIP": "188.224.0.82",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"36.224.212.78","externalIp":"188.224.0.82","categories":["Malware"],"tags":[],"destination":"graywhalefoundation.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:22:52.000Z"} ::: clientIP=36.224.212.78 ::: serverIP=188.224.0.82 ::: userName=janedoe ::: created_at=2023-04-10T15:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:22:52.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"36.224.212.78","externalIp":"188.224.0.82","categories":["Malware"],"tags":[],"destination":"graywhalefoundation.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:22:52.000Z"} ::: clientIP=36.224.212.78 ::: serverIP=188.224.0.82 ::: userName=janedoe ::: created_at=2023-04-10T15:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:22:52.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: graywhalefoundation.org
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: graywhalefoundation.org
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-10T15:22:52.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 36.224.212.78
serverIP: 188.224.0.82
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"153.217.109.208","externalIp":"222.246.38.254","categories":["Malware"],"tags":[],"destination":"graywhalefoundation.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:22:52.000Z"} ::: clientIP=153.217.109.208 ::: serverIP=222.246.38.254 ::: userName=janedoe ::: created_at=2023-04-10T15:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:22:52.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "graywhalefoundation.org",
"message": "WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"153.217.109.208\",\"externalIp\":\"222.246.38.254\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"graywhalefoundation.org\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-10T15:22:52.000Z\"} ::: clientIP=153.217.109.208 ::: serverIP=222.246.38.254 ::: userName=janedoe ::: created_at=2023-04-10T15:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:22:52.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "graywhalefoundation.org",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-10T15:22:52.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "153.217.109.208",
"serverIP": "222.246.38.254",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"153.217.109.208","externalIp":"222.246.38.254","categories":["Malware"],"tags":[],"destination":"graywhalefoundation.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:22:52.000Z"} ::: clientIP=153.217.109.208 ::: serverIP=222.246.38.254 ::: userName=janedoe ::: created_at=2023-04-10T15:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:22:52.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"153.217.109.208","externalIp":"222.246.38.254","categories":["Malware"],"tags":[],"destination":"graywhalefoundation.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:22:52.000Z"} ::: clientIP=153.217.109.208 ::: serverIP=222.246.38.254 ::: userName=janedoe ::: created_at=2023-04-10T15:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:22:52.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: graywhalefoundation.org
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: graywhalefoundation.org
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-10T15:22:52.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 153.217.109.208
serverIP: 222.246.38.254
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"223.52.110.205","externalIp":"143.91.169.12","categories":["Cryptomining"],"tags":[],"destination":"api.aurorapush.cc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-29T19:35:53.000Z"} ::: clientIP=223.52.110.205 ::: serverIP=143.91.169.12 ::: userName=janedoe ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "api.aurorapush.cc",
"message": "WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"223.52.110.205\",\"externalIp\":\"143.91.169.12\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"api.aurorapush.cc\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-29T19:35:53.000Z\"} ::: clientIP=223.52.110.205 ::: serverIP=143.91.169.12 ::: userName=janedoe ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "api.aurorapush.cc",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-29T19:35:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Cryptomining",
"streamName": "OpenDNS Detection",
"clientIP": "223.52.110.205",
"serverIP": "143.91.169.12",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"223.52.110.205","externalIp":"143.91.169.12","categories":["Cryptomining"],"tags":[],"destination":"api.aurorapush.cc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-29T19:35:53.000Z"} ::: clientIP=223.52.110.205 ::: serverIP=143.91.169.12 ::: userName=janedoe ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"223.52.110.205","externalIp":"143.91.169.12","categories":["Cryptomining"],"tags":[],"destination":"api.aurorapush.cc","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-29T19:35:53.000Z"} ::: clientIP=223.52.110.205 ::: serverIP=143.91.169.12 ::: userName=janedoe ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: api.aurorapush.cc
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: api.aurorapush.cc
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-29T19:35:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Cryptomining
streamName: OpenDNS Detection
clientIP: 223.52.110.205
serverIP: 143.91.169.12
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"194.185.196.155","externalIp":"148.103.108.37","categories":["Cryptomining"],"tags":[],"destination":"api.aurorapush.cc","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-29T19:35:53.000Z"} ::: clientIP=194.185.196.155 ::: serverIP=148.103.108.37 ::: userName=fish ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "api.aurorapush.cc",
"message": "WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={\"originId\":600808038,\"originType\":\"Network Devices\",\"internalIp\":\"194.185.196.155\",\"externalIp\":\"148.103.108.37\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"api.aurorapush.cc\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-29T19:35:53.000Z\"} ::: clientIP=194.185.196.155 ::: serverIP=148.103.108.37 ::: userName=fish ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "api.aurorapush.cc",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-29T19:35:53.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Cryptomining",
"streamName": "OpenDNS Detection",
"clientIP": "194.185.196.155",
"serverIP": "148.103.108.37",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"194.185.196.155","externalIp":"148.103.108.37","categories":["Cryptomining"],"tags":[],"destination":"api.aurorapush.cc","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-29T19:35:53.000Z"} ::: clientIP=194.185.196.155 ::: serverIP=148.103.108.37 ::: userName=fish ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=api.aurorapush.cc ::: action=BLOCKED ::: message={"originId":600808038,"originType":"Network Devices","internalIp":"194.185.196.155","externalIp":"148.103.108.37","categories":["Cryptomining"],"tags":[],"destination":"api.aurorapush.cc","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-29T19:35:53.000Z"} ::: clientIP=194.185.196.155 ::: serverIP=148.103.108.37 ::: userName=fish ::: created_at=2023-03-29T19:35:53.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-29T19:35:53.000Z ::: serverHostname=api.aurorapush.cc ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: api.aurorapush.cc
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: api.aurorapush.cc
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-29T19:35:53.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Cryptomining
streamName: OpenDNS Detection
clientIP: 194.185.196.155
serverIP: 148.103.108.37
userName: fish | Explain this syslog message |
<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=239.33.114.172 dst=11.199.69.214 protocol=udp sport=53535 dport=53 decision=blocked | {
"action": "block",
"clientport": 53535,
"message": "<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=239.33.114.172 dst=11.199.69.214 protocol=udp sport=53535 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "239.33.114.172",
"serverIP": "11.199.69.214"
} | Create a JSON artifact from the message |
<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=239.33.114.172 dst=11.199.69.214 protocol=udp sport=53535 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=239.33.114.172 dst=11.199.69.214 protocol=udp sport=53535 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53535
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 239.33.114.172
serverIP: 11.199.69.214 | Explain this syslog message |
<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=26.100.114.7 dst=123.189.253.154 protocol=udp sport=53535 dport=53 decision=blocked | {
"action": "block",
"clientport": 53535,
"message": "<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=26.100.114.7 dst=123.189.253.154 protocol=udp sport=53535 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "26.100.114.7",
"serverIP": "123.189.253.154"
} | Create a JSON artifact from the message |
<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=26.100.114.7 dst=123.189.253.154 protocol=udp sport=53535 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=26.100.114.7 dst=123.189.253.154 protocol=udp sport=53535 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53535
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 26.100.114.7
serverIP: 123.189.253.154 | Explain this syslog message |
<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=239.74.16.178 dst=216.102.120.10 protocol=udp sport=53535 dport=53 decision=blocked | {
"action": "block",
"clientport": 53535,
"message": "<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=239.74.16.178 dst=216.102.120.10 protocol=udp sport=53535 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "239.74.16.178",
"serverIP": "216.102.120.10"
} | Create a JSON artifact from the message |
<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=239.74.16.178 dst=216.102.120.10 protocol=udp sport=53535 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=239.74.16.178 dst=216.102.120.10 protocol=udp sport=53535 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53535
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 239.74.16.178
serverIP: 216.102.120.10 | Explain this syslog message |
<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=86.238.184.42 dst=86.164.162.247 protocol=udp sport=53535 dport=53 decision=blocked | {
"action": "block",
"clientport": 53535,
"message": "<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=86.238.184.42 dst=86.164.162.247 protocol=udp sport=53535 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "86.238.184.42",
"serverIP": "86.164.162.247"
} | Create a JSON artifact from the message |
<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=86.238.184.42 dst=86.164.162.247 protocol=udp sport=53535 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=206.74.215.73 1 1686660970.134329141 M67_MX67C_Hardeeville l7_firewall src=86.238.184.42 dst=86.164.162.247 protocol=udp sport=53535 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53535
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 86.238.184.42
serverIP: 86.164.162.247 | Explain this syslog message |
<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=143.152.141.71 dst=236.174.244.153 protocol=udp sport=58120 dport=53 decision=blocked | {
"action": "block",
"clientport": 58120,
"message": "<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=143.152.141.71 dst=236.174.244.153 protocol=udp sport=58120 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "143.152.141.71",
"serverIP": "236.174.244.153"
} | Create a JSON artifact from the message |
<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=143.152.141.71 dst=236.174.244.153 protocol=udp sport=58120 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=143.152.141.71 dst=236.174.244.153 protocol=udp sport=58120 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58120
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 143.152.141.71
serverIP: 236.174.244.153 | Explain this syslog message |
<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=161.243.56.19 dst=9.254.17.172 protocol=udp sport=58120 dport=53 decision=blocked | {
"action": "block",
"clientport": 58120,
"message": "<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=161.243.56.19 dst=9.254.17.172 protocol=udp sport=58120 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "161.243.56.19",
"serverIP": "9.254.17.172"
} | Create a JSON artifact from the message |
<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=161.243.56.19 dst=9.254.17.172 protocol=udp sport=58120 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=161.243.56.19 dst=9.254.17.172 protocol=udp sport=58120 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58120
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 161.243.56.19
serverIP: 9.254.17.172 | Explain this syslog message |
<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=21.83.4.217 dst=213.98.92.29 protocol=udp sport=58120 dport=53 decision=blocked | {
"action": "block",
"clientport": 58120,
"message": "<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=21.83.4.217 dst=213.98.92.29 protocol=udp sport=58120 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "21.83.4.217",
"serverIP": "213.98.92.29"
} | Create a JSON artifact from the message |
<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=21.83.4.217 dst=213.98.92.29 protocol=udp sport=58120 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=21.83.4.217 dst=213.98.92.29 protocol=udp sport=58120 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58120
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 21.83.4.217
serverIP: 213.98.92.29 | Explain this syslog message |
<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=102.255.69.147 dst=216.86.204.227 protocol=udp sport=58120 dport=53 decision=blocked | {
"action": "block",
"clientport": 58120,
"message": "<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=102.255.69.147 dst=216.86.204.227 protocol=udp sport=58120 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "102.255.69.147",
"serverIP": "216.86.204.227"
} | Create a JSON artifact from the message |
<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=102.255.69.147 dst=216.86.204.227 protocol=udp sport=58120 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=206.74.215.73 1 1686660966.275013861 M67_MX67C_Hardeeville l7_firewall src=102.255.69.147 dst=216.86.204.227 protocol=udp sport=58120 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58120
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 102.255.69.147
serverIP: 216.86.204.227 | Explain this syslog message |
<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=112.134.216.211 dst=129.45.66.154 protocol=tcp sport=57121 dport=443 decision=blocked | {
"action": "block",
"clientport": 57121,
"message": "<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=112.134.216.211 dst=129.45.66.154 protocol=tcp sport=57121 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "112.134.216.211",
"serverIP": "129.45.66.154"
} | Create a JSON artifact from the message |
<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=112.134.216.211 dst=129.45.66.154 protocol=tcp sport=57121 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=112.134.216.211 dst=129.45.66.154 protocol=tcp sport=57121 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57121
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 112.134.216.211
serverIP: 129.45.66.154 | Explain this syslog message |
<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=178.139.132.218 dst=209.198.152.0 protocol=tcp sport=57121 dport=443 decision=blocked | {
"action": "block",
"clientport": 57121,
"message": "<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=178.139.132.218 dst=209.198.152.0 protocol=tcp sport=57121 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "178.139.132.218",
"serverIP": "209.198.152.0"
} | Create a JSON artifact from the message |
<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=178.139.132.218 dst=209.198.152.0 protocol=tcp sport=57121 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=178.139.132.218 dst=209.198.152.0 protocol=tcp sport=57121 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57121
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 178.139.132.218
serverIP: 209.198.152.0 | Explain this syslog message |
<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=75.245.249.239 dst=128.77.101.242 protocol=tcp sport=57121 dport=443 decision=blocked | {
"action": "block",
"clientport": 57121,
"message": "<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=75.245.249.239 dst=128.77.101.242 protocol=tcp sport=57121 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "75.245.249.239",
"serverIP": "128.77.101.242"
} | Create a JSON artifact from the message |
<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=75.245.249.239 dst=128.77.101.242 protocol=tcp sport=57121 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=75.245.249.239 dst=128.77.101.242 protocol=tcp sport=57121 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57121
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 75.245.249.239
serverIP: 128.77.101.242 | Explain this syslog message |
<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=188.213.4.128 dst=203.239.64.47 protocol=tcp sport=57121 dport=443 decision=blocked | {
"action": "block",
"clientport": 57121,
"message": "<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=188.213.4.128 dst=203.239.64.47 protocol=tcp sport=57121 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "188.213.4.128",
"serverIP": "203.239.64.47"
} | Create a JSON artifact from the message |
<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=188.213.4.128 dst=203.239.64.47 protocol=tcp sport=57121 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.87.229.81 1 1687487095.882548314 M23_MX67C_CRMarietta l7_firewall src=188.213.4.128 dst=203.239.64.47 protocol=tcp sport=57121 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57121
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 188.213.4.128
serverIP: 203.239.64.47 | Explain this syslog message |
<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=41.66.154.16 dpt=443 act=DENY msg=[t3 12.1.2] duser="-" src=67.71.242.228 spt=45852 requestMethod="-" app=TLSv1.3 requestContext="-" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=67.71.242.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45852,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1709907804268 ",
"message": "<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=41.66.154.16 dpt=443 act=DENY msg=[t3 12.1.2] duser=\"-\" src=67.71.242.228 spt=45852 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=67.71.242.228 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:165.154.172.88",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "67.71.242.228",
"serverIP": "41.66.154.16",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=41.66.154.16 dpt=443 act=DENY msg=[t3 12.1.2] duser="-" src=67.71.242.228 spt=45852 requestMethod="-" app=TLSv1.3 requestContext="-" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=67.71.242.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=41.66.154.16 dpt=443 act=DENY msg=[t3 12.1.2] duser="-" src=67.71.242.228 spt=45852 requestMethod="-" app=TLSv1.3 requestContext="-" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=67.71.242.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45852
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1709907804268
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:165.154.172.88', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 67.71.242.228
serverIP: 41.66.154.16
userName: - | Explain this syslog message |
<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=110.194.9.246 dpt=443 act=DENY msg=[t3 12.1.2] duser="-" src=202.198.168.157 spt=45852 requestMethod="-" app=TLSv1.3 requestContext="-" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=202.198.168.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45852,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1709907804268 ",
"message": "<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=110.194.9.246 dpt=443 act=DENY msg=[t3 12.1.2] duser=\"-\" src=202.198.168.157 spt=45852 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=202.198.168.157 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:165.154.172.88",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "202.198.168.157",
"serverIP": "110.194.9.246",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=110.194.9.246 dpt=443 act=DENY msg=[t3 12.1.2] duser="-" src=202.198.168.157 spt=45852 requestMethod="-" app=TLSv1.3 requestContext="-" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=202.198.168.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=110.194.9.246 dpt=443 act=DENY msg=[t3 12.1.2] duser="-" src=202.198.168.157 spt=45852 requestMethod="-" app=TLSv1.3 requestContext="-" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=202.198.168.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45852
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1709907804268
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:165.154.172.88', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 202.198.168.157
serverIP: 110.194.9.246
userName: - | Explain this syslog message |
<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=86.180.197.219 dpt=443 act=DENY msg=[t3 12.1.2] duser="-" src=197.107.198.143 spt=45852 requestMethod="-" app=TLSv1.3 requestContext="-" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=197.107.198.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45852,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1709907804268 ",
"message": "<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=86.180.197.219 dpt=443 act=DENY msg=[t3 12.1.2] duser=\"-\" src=197.107.198.143 spt=45852 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=197.107.198.143 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:165.154.172.88",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "197.107.198.143",
"serverIP": "86.180.197.219",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=86.180.197.219 dpt=443 act=DENY msg=[t3 12.1.2] duser="-" src=197.107.198.143 spt=45852 requestMethod="-" app=TLSv1.3 requestContext="-" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=197.107.198.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=86.180.197.219 dpt=443 act=DENY msg=[t3 12.1.2] duser="-" src=197.107.198.143 spt=45852 requestMethod="-" app=TLSv1.3 requestContext="-" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=197.107.198.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45852
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1709907804268
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:165.154.172.88', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 197.107.198.143
serverIP: 86.180.197.219
userName: - | Explain this syslog message |
<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=73.242.238.176 dpt=443 act=DENY msg=[t3 12.1.2] duser="-" src=113.210.146.132 spt=45852 requestMethod="-" app=TLSv1.3 requestContext="-" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=113.210.146.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45852,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1709907804268 ",
"message": "<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=73.242.238.176 dpt=443 act=DENY msg=[t3 12.1.2] duser=\"-\" src=113.210.146.132 spt=45852 requestMethod=\"-\" app=TLSv1.3 requestContext=\"-\" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=113.210.146.132 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:165.154.172.88",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "113.210.146.132",
"serverIP": "73.242.238.176",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=73.242.238.176 dpt=443 act=DENY msg=[t3 12.1.2] duser="-" src=113.210.146.132 spt=45852 requestMethod="-" app=TLSv1.3 requestContext="-" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=113.210.146.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 8 08:23:24 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=73.242.238.176 dpt=443 act=DENY msg=[t3 12.1.2] duser="-" src=113.210.146.132 spt=45852 requestMethod="-" app=TLSv1.3 requestContext="-" start=Mar 08 2024 08:23:24 rt=1709907804268 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1e72806c-da7dc2d cn2=45852 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=113.210.146.132 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45852
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1709907804268
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:165.154.172.88', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 113.210.146.132
serverIP: 73.242.238.176
userName: - | Explain this syslog message |
<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=77.84.164.141 dst=5.140.95.163 protocol=tcp sport=57438 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=77.84.164.141 dst=5.140.95.163 protocol=tcp sport=57438 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57438,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "77.84.164.141",
"serverIP": "5.140.95.163"
} | Create a JSON artifact from the message |
<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=77.84.164.141 dst=5.140.95.163 protocol=tcp sport=57438 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=77.84.164.141 dst=5.140.95.163 protocol=tcp sport=57438 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57438
protocol: 6
streamName: meraki_l7_firewall
clientIP: 77.84.164.141
serverIP: 5.140.95.163 | Explain this syslog message |
<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=161.228.21.8 dst=53.139.42.237 protocol=tcp sport=57438 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=161.228.21.8 dst=53.139.42.237 protocol=tcp sport=57438 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57438,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "161.228.21.8",
"serverIP": "53.139.42.237"
} | Create a JSON artifact from the message |
<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=161.228.21.8 dst=53.139.42.237 protocol=tcp sport=57438 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=161.228.21.8 dst=53.139.42.237 protocol=tcp sport=57438 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57438
protocol: 6
streamName: meraki_l7_firewall
clientIP: 161.228.21.8
serverIP: 53.139.42.237 | Explain this syslog message |
<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=84.9.176.251 dst=142.220.101.186 protocol=tcp sport=57438 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=84.9.176.251 dst=142.220.101.186 protocol=tcp sport=57438 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57438,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "84.9.176.251",
"serverIP": "142.220.101.186"
} | Create a JSON artifact from the message |
<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=84.9.176.251 dst=142.220.101.186 protocol=tcp sport=57438 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=84.9.176.251 dst=142.220.101.186 protocol=tcp sport=57438 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57438
protocol: 6
streamName: meraki_l7_firewall
clientIP: 84.9.176.251
serverIP: 142.220.101.186 | Explain this syslog message |
<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=54.143.176.170 dst=145.22.201.235 protocol=tcp sport=57438 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=54.143.176.170 dst=145.22.201.235 protocol=tcp sport=57438 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57438,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "54.143.176.170",
"serverIP": "145.22.201.235"
} | Create a JSON artifact from the message |
<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=54.143.176.170 dst=145.22.201.235 protocol=tcp sport=57438 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=198.24.89.6 1 1657388351.162402487 M66_MX67C_HiltonHead l7_firewall src=54.143.176.170 dst=145.22.201.235 protocol=tcp sport=57438 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57438
protocol: 6
streamName: meraki_l7_firewall
clientIP: 54.143.176.170
serverIP: 145.22.201.235 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=61.123.73.61 dst=103.158.14.30 protocol=udp sport=62233 dport=9102 decision=blocked | {
"action": "block",
"clientport": 62233,
"message": "<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=61.123.73.61 dst=103.158.14.30 protocol=udp sport=62233 dport=9102 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 9102,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "61.123.73.61",
"serverIP": "103.158.14.30"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=61.123.73.61 dst=103.158.14.30 protocol=udp sport=62233 dport=9102 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=61.123.73.61 dst=103.158.14.30 protocol=udp sport=62233 dport=9102 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62233
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 9102
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 61.123.73.61
serverIP: 103.158.14.30 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=131.20.137.72 dst=251.200.90.15 protocol=udp sport=62233 dport=9102 decision=blocked | {
"action": "block",
"clientport": 62233,
"message": "<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=131.20.137.72 dst=251.200.90.15 protocol=udp sport=62233 dport=9102 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 9102,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "131.20.137.72",
"serverIP": "251.200.90.15"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=131.20.137.72 dst=251.200.90.15 protocol=udp sport=62233 dport=9102 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=131.20.137.72 dst=251.200.90.15 protocol=udp sport=62233 dport=9102 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62233
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 9102
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 131.20.137.72
serverIP: 251.200.90.15 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=252.215.232.101 dst=152.207.224.168 protocol=udp sport=62233 dport=9102 decision=blocked | {
"action": "block",
"clientport": 62233,
"message": "<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=252.215.232.101 dst=152.207.224.168 protocol=udp sport=62233 dport=9102 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 9102,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "252.215.232.101",
"serverIP": "152.207.224.168"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=252.215.232.101 dst=152.207.224.168 protocol=udp sport=62233 dport=9102 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=252.215.232.101 dst=152.207.224.168 protocol=udp sport=62233 dport=9102 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62233
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 9102
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 252.215.232.101
serverIP: 152.207.224.168 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=231.74.210.110 dst=178.109.178.252 protocol=udp sport=62233 dport=9102 decision=blocked | {
"action": "block",
"clientport": 62233,
"message": "<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=231.74.210.110 dst=178.109.178.252 protocol=udp sport=62233 dport=9102 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 9102,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "231.74.210.110",
"serverIP": "178.109.178.252"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=231.74.210.110 dst=178.109.178.252 protocol=udp sport=62233 dport=9102 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688107379.649220863 NORDC_MX400_1 l7_firewall src=231.74.210.110 dst=178.109.178.252 protocol=udp sport=62233 dport=9102 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62233
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 9102
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 231.74.210.110
serverIP: 178.109.178.252 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=23.31.241.41 dst=64.78.206.139 protocol=tcp sport=56116 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=23.31.241.41 dst=64.78.206.139 protocol=tcp sport=56116 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56116,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "23.31.241.41",
"serverIP": "64.78.206.139"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=23.31.241.41 dst=64.78.206.139 protocol=tcp sport=56116 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=23.31.241.41 dst=64.78.206.139 protocol=tcp sport=56116 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56116
protocol: 6
streamName: meraki_l7_firewall
clientIP: 23.31.241.41
serverIP: 64.78.206.139 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=211.81.49.226 dst=146.239.146.106 protocol=tcp sport=56116 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=211.81.49.226 dst=146.239.146.106 protocol=tcp sport=56116 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56116,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "211.81.49.226",
"serverIP": "146.239.146.106"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=211.81.49.226 dst=146.239.146.106 protocol=tcp sport=56116 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=211.81.49.226 dst=146.239.146.106 protocol=tcp sport=56116 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56116
protocol: 6
streamName: meraki_l7_firewall
clientIP: 211.81.49.226
serverIP: 146.239.146.106 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=81.135.88.5 dst=36.218.170.161 protocol=tcp sport=56116 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=81.135.88.5 dst=36.218.170.161 protocol=tcp sport=56116 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56116,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "81.135.88.5",
"serverIP": "36.218.170.161"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=81.135.88.5 dst=36.218.170.161 protocol=tcp sport=56116 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=81.135.88.5 dst=36.218.170.161 protocol=tcp sport=56116 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56116
protocol: 6
streamName: meraki_l7_firewall
clientIP: 81.135.88.5
serverIP: 36.218.170.161 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=44.168.110.9 dst=226.202.173.3 protocol=tcp sport=56116 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=44.168.110.9 dst=226.202.173.3 protocol=tcp sport=56116 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56116,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "44.168.110.9",
"serverIP": "226.202.173.3"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.