input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=44.168.110.9 dst=226.202.173.3 protocol=tcp sport=56116 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=44.168.110.9 dst=226.202.173.3 protocol=tcp sport=56116 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 56116 protocol: 6 streamName: meraki_l7_firewall clientIP: 44.168.110.9 serverIP: 226.202.173.3
Explain this syslog message
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=45.20.196.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.239.210.106 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.239.210.106 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:5.188.86.227", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=45.20.196.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=83.239.210.106 spt=50572 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36\" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.239.210.106 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1661014052606 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 50572, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "83.239.210.106", "serverIP": "45.20.196.26", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=45.20.196.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.239.210.106 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.239.210.106 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=45.20.196.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.239.210.106 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.239.210.106 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:5.188.86.227', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1661014052606 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 50572 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 83.239.210.106 serverIP: 45.20.196.26 userName: -
Explain this syslog message
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=190.54.162.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.174.112.232 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.174.112.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:5.188.86.227", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=190.54.162.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=56.174.112.232 spt=50572 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36\" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.174.112.232 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1661014052606 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 50572, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "56.174.112.232", "serverIP": "190.54.162.207", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=190.54.162.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.174.112.232 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.174.112.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=190.54.162.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.174.112.232 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.174.112.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:5.188.86.227', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1661014052606 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 50572 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 56.174.112.232 serverIP: 190.54.162.207 userName: -
Explain this syslog message
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=243.71.248.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=138.151.110.39 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=138.151.110.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:5.188.86.227", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=243.71.248.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=138.151.110.39 spt=50572 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36\" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=138.151.110.39 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1661014052606 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 50572, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "138.151.110.39", "serverIP": "243.71.248.21", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=243.71.248.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=138.151.110.39 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=138.151.110.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=243.71.248.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=138.151.110.39 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=138.151.110.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:5.188.86.227', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1661014052606 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 50572 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 138.151.110.39 serverIP: 243.71.248.21 userName: -
Explain this syslog message
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=209.123.71.209 dpt=443 act=DENY msg=["-"] duser="-" src=147.6.179.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=147.6.179.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35295, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/.well-known/assetlinks.json", "localhostname": "WAFirewall", "localstarttime": "1717708299924 ", "message": "<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=209.123.71.209 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=147.6.179.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36\" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=147.6.179.7 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "SLASH_DOT_IN_URL", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:209.85.238.163", "barracuda_waf", "cef", "FollowUpAction:NONE", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "vendorcode": "14", "streamName": "barracuda_waf", "clientIP": "147.6.179.7", "serverIP": "209.123.71.209", "userName": "-" }
Create a JSON artifact from the message
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=209.123.71.209 dpt=443 act=DENY msg=["-"] duser="-" src=147.6.179.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=147.6.179.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=209.123.71.209 dpt=443 act=DENY msg=["-"] duser="-" src=147.6.179.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=147.6.179.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35295 facilitycode: 23 facilitylabel: local7 fqdn: /.well-known/assetlinks.json localhostname: WAFirewall localstarttime: 1717708299924 messagetype: SLASH_DOT_IN_URL priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:209.85.238.163', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] vendorcode: 14 streamName: barracuda_waf clientIP: 147.6.179.7 serverIP: 209.123.71.209 userName: -
Explain this syslog message
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=150.228.180.189 dpt=443 act=DENY msg=["-"] duser="-" src=236.15.15.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=236.15.15.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35295, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/.well-known/assetlinks.json", "localhostname": "WAFirewall", "localstarttime": "1717708299924 ", "message": "<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=150.228.180.189 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=236.15.15.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36\" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=236.15.15.7 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "SLASH_DOT_IN_URL", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:209.85.238.163", "barracuda_waf", "cef", "FollowUpAction:NONE", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "vendorcode": "14", "streamName": "barracuda_waf", "clientIP": "236.15.15.7", "serverIP": "150.228.180.189", "userName": "-" }
Create a JSON artifact from the message
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=150.228.180.189 dpt=443 act=DENY msg=["-"] duser="-" src=236.15.15.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=236.15.15.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=150.228.180.189 dpt=443 act=DENY msg=["-"] duser="-" src=236.15.15.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=236.15.15.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35295 facilitycode: 23 facilitylabel: local7 fqdn: /.well-known/assetlinks.json localhostname: WAFirewall localstarttime: 1717708299924 messagetype: SLASH_DOT_IN_URL priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:209.85.238.163', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] vendorcode: 14 streamName: barracuda_waf clientIP: 236.15.15.7 serverIP: 150.228.180.189 userName: -
Explain this syslog message
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=68.220.12.66 dpt=443 act=DENY msg=["-"] duser="-" src=29.77.144.62 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.77.144.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35295, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/.well-known/assetlinks.json", "localhostname": "WAFirewall", "localstarttime": "1717708299924 ", "message": "<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=68.220.12.66 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=29.77.144.62 spt=35295 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36\" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.77.144.62 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "SLASH_DOT_IN_URL", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:209.85.238.163", "barracuda_waf", "cef", "FollowUpAction:NONE", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "vendorcode": "14", "streamName": "barracuda_waf", "clientIP": "29.77.144.62", "serverIP": "68.220.12.66", "userName": "-" }
Create a JSON artifact from the message
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=68.220.12.66 dpt=443 act=DENY msg=["-"] duser="-" src=29.77.144.62 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.77.144.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=68.220.12.66 dpt=443 act=DENY msg=["-"] duser="-" src=29.77.144.62 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.77.144.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35295 facilitycode: 23 facilitylabel: local7 fqdn: /.well-known/assetlinks.json localhostname: WAFirewall localstarttime: 1717708299924 messagetype: SLASH_DOT_IN_URL priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:209.85.238.163', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] vendorcode: 14 streamName: barracuda_waf clientIP: 29.77.144.62 serverIP: 68.220.12.66 userName: -
Explain this syslog message
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=27.131.217.80 dst=107.152.15.148 protocol=tcp sport=58755 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=27.131.217.80 dst=107.152.15.148 protocol=tcp sport=58755 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 58755, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "27.131.217.80", "serverIP": "107.152.15.148" }
Create a JSON artifact from the message
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=27.131.217.80 dst=107.152.15.148 protocol=tcp sport=58755 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=27.131.217.80 dst=107.152.15.148 protocol=tcp sport=58755 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 58755 protocol: 6 streamName: meraki_l7_firewall clientIP: 27.131.217.80 serverIP: 107.152.15.148
Explain this syslog message
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=71.185.200.39 dst=80.142.83.176 protocol=tcp sport=58755 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=71.185.200.39 dst=80.142.83.176 protocol=tcp sport=58755 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 58755, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "71.185.200.39", "serverIP": "80.142.83.176" }
Create a JSON artifact from the message
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=71.185.200.39 dst=80.142.83.176 protocol=tcp sport=58755 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=71.185.200.39 dst=80.142.83.176 protocol=tcp sport=58755 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 58755 protocol: 6 streamName: meraki_l7_firewall clientIP: 71.185.200.39 serverIP: 80.142.83.176
Explain this syslog message
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=240.138.90.111 dst=65.114.132.118 protocol=tcp sport=58755 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=240.138.90.111 dst=65.114.132.118 protocol=tcp sport=58755 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 58755, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "240.138.90.111", "serverIP": "65.114.132.118" }
Create a JSON artifact from the message
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=240.138.90.111 dst=65.114.132.118 protocol=tcp sport=58755 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=240.138.90.111 dst=65.114.132.118 protocol=tcp sport=58755 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 58755 protocol: 6 streamName: meraki_l7_firewall clientIP: 240.138.90.111 serverIP: 65.114.132.118
Explain this syslog message
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=117.247.205.218 dst=91.166.151.110 protocol=tcp sport=58755 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=117.247.205.218 dst=91.166.151.110 protocol=tcp sport=58755 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 58755, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "117.247.205.218", "serverIP": "91.166.151.110" }
Create a JSON artifact from the message
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=117.247.205.218 dst=91.166.151.110 protocol=tcp sport=58755 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=117.247.205.218 dst=91.166.151.110 protocol=tcp sport=58755 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 58755 protocol: 6 streamName: meraki_l7_firewall clientIP: 117.247.205.218 serverIP: 91.166.151.110
Explain this syslog message
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=49.148.120.131 dst=145.58.50.91 protocol=tcp sport=60822 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=49.148.120.131 dst=145.58.50.91 protocol=tcp sport=60822 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 60822, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "49.148.120.131", "serverIP": "145.58.50.91" }
Create a JSON artifact from the message
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=49.148.120.131 dst=145.58.50.91 protocol=tcp sport=60822 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=49.148.120.131 dst=145.58.50.91 protocol=tcp sport=60822 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 60822 protocol: 6 streamName: meraki_l7_firewall clientIP: 49.148.120.131 serverIP: 145.58.50.91
Explain this syslog message
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=76.226.20.75 dst=109.149.39.108 protocol=tcp sport=60822 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=76.226.20.75 dst=109.149.39.108 protocol=tcp sport=60822 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 60822, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "76.226.20.75", "serverIP": "109.149.39.108" }
Create a JSON artifact from the message
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=76.226.20.75 dst=109.149.39.108 protocol=tcp sport=60822 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=76.226.20.75 dst=109.149.39.108 protocol=tcp sport=60822 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 60822 protocol: 6 streamName: meraki_l7_firewall clientIP: 76.226.20.75 serverIP: 109.149.39.108
Explain this syslog message
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=244.101.71.201 dst=223.126.106.242 protocol=tcp sport=60822 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=244.101.71.201 dst=223.126.106.242 protocol=tcp sport=60822 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 60822, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "244.101.71.201", "serverIP": "223.126.106.242" }
Create a JSON artifact from the message
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=244.101.71.201 dst=223.126.106.242 protocol=tcp sport=60822 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=244.101.71.201 dst=223.126.106.242 protocol=tcp sport=60822 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 60822 protocol: 6 streamName: meraki_l7_firewall clientIP: 244.101.71.201 serverIP: 223.126.106.242
Explain this syslog message
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=124.178.162.9 dst=251.36.81.85 protocol=tcp sport=60822 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=124.178.162.9 dst=251.36.81.85 protocol=tcp sport=60822 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 60822, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "124.178.162.9", "serverIP": "251.36.81.85" }
Create a JSON artifact from the message
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=124.178.162.9 dst=251.36.81.85 protocol=tcp sport=60822 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=124.178.162.9 dst=251.36.81.85 protocol=tcp sport=60822 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 60822 protocol: 6 streamName: meraki_l7_firewall clientIP: 124.178.162.9 serverIP: 251.36.81.85
Explain this syslog message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=13.31.118.171 dpt=443 act=DENY msg=["-"] duser="-" src=12.244.127.21 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.244.127.21 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59167, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/.well-known/assetlinks.json", "localhostname": "WAFirewall", "localstarttime": "1714712375724 ", "message": "<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=13.31.118.171 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=12.244.127.21 spt=59167 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.244.127.21 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "SLASH_DOT_IN_URL", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "barracuda_waf", "cef", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:66.249.66.197", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "vendorcode": "14", "streamName": "barracuda_waf", "clientIP": "12.244.127.21", "serverIP": "13.31.118.171", "userName": "-" }
Create a JSON artifact from the message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=13.31.118.171 dpt=443 act=DENY msg=["-"] duser="-" src=12.244.127.21 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.244.127.21 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=13.31.118.171 dpt=443 act=DENY msg=["-"] duser="-" src=12.244.127.21 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.244.127.21 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59167 facilitycode: 23 facilitylabel: local7 fqdn: /.well-known/assetlinks.json localhostname: WAFirewall localstarttime: 1714712375724 messagetype: SLASH_DOT_IN_URL priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:66.249.66.197', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] vendorcode: 14 streamName: barracuda_waf clientIP: 12.244.127.21 serverIP: 13.31.118.171 userName: -
Explain this syslog message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=249.194.147.133 dpt=443 act=DENY msg=["-"] duser="-" src=228.48.249.234 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=228.48.249.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59167, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/.well-known/assetlinks.json", "localhostname": "WAFirewall", "localstarttime": "1714712375724 ", "message": "<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=249.194.147.133 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=228.48.249.234 spt=59167 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=228.48.249.234 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "SLASH_DOT_IN_URL", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "barracuda_waf", "cef", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:66.249.66.197", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "vendorcode": "14", "streamName": "barracuda_waf", "clientIP": "228.48.249.234", "serverIP": "249.194.147.133", "userName": "-" }
Create a JSON artifact from the message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=249.194.147.133 dpt=443 act=DENY msg=["-"] duser="-" src=228.48.249.234 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=228.48.249.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=249.194.147.133 dpt=443 act=DENY msg=["-"] duser="-" src=228.48.249.234 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=228.48.249.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59167 facilitycode: 23 facilitylabel: local7 fqdn: /.well-known/assetlinks.json localhostname: WAFirewall localstarttime: 1714712375724 messagetype: SLASH_DOT_IN_URL priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:66.249.66.197', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] vendorcode: 14 streamName: barracuda_waf clientIP: 228.48.249.234 serverIP: 249.194.147.133 userName: -
Explain this syslog message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=5.171.116.194 dpt=443 act=DENY msg=["-"] duser="-" src=151.162.159.198 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.162.159.198 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59167, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/.well-known/assetlinks.json", "localhostname": "WAFirewall", "localstarttime": "1714712375724 ", "message": "<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=5.171.116.194 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=151.162.159.198 spt=59167 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.162.159.198 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "SLASH_DOT_IN_URL", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "barracuda_waf", "cef", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:66.249.66.197", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "vendorcode": "14", "streamName": "barracuda_waf", "clientIP": "151.162.159.198", "serverIP": "5.171.116.194", "userName": "-" }
Create a JSON artifact from the message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=5.171.116.194 dpt=443 act=DENY msg=["-"] duser="-" src=151.162.159.198 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.162.159.198 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=5.171.116.194 dpt=443 act=DENY msg=["-"] duser="-" src=151.162.159.198 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.162.159.198 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59167 facilitycode: 23 facilitylabel: local7 fqdn: /.well-known/assetlinks.json localhostname: WAFirewall localstarttime: 1714712375724 messagetype: SLASH_DOT_IN_URL priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:66.249.66.197', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] vendorcode: 14 streamName: barracuda_waf clientIP: 151.162.159.198 serverIP: 5.171.116.194 userName: -
Explain this syslog message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=81.0.202.102 dpt=443 act=DENY msg=["-"] duser="-" src=38.208.235.99 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=38.208.235.99 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59167, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/.well-known/assetlinks.json", "localhostname": "WAFirewall", "localstarttime": "1714712375724 ", "message": "<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=81.0.202.102 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=38.208.235.99 spt=59167 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=38.208.235.99 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "SLASH_DOT_IN_URL", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "barracuda_waf", "cef", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:66.249.66.197", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "vendorcode": "14", "streamName": "barracuda_waf", "clientIP": "38.208.235.99", "serverIP": "81.0.202.102", "userName": "-" }
Create a JSON artifact from the message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=81.0.202.102 dpt=443 act=DENY msg=["-"] duser="-" src=38.208.235.99 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=38.208.235.99 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=81.0.202.102 dpt=443 act=DENY msg=["-"] duser="-" src=38.208.235.99 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=38.208.235.99 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59167 facilitycode: 23 facilitylabel: local7 fqdn: /.well-known/assetlinks.json localhostname: WAFirewall localstarttime: 1714712375724 messagetype: SLASH_DOT_IN_URL priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:66.249.66.197', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] vendorcode: 14 streamName: barracuda_waf clientIP: 38.208.235.99 serverIP: 81.0.202.102 userName: -
Explain this syslog message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=22.115.5.100 dpt=443 act=DENY msg=["-"] duser="-" src=229.104.63.28 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=229.104.63.28 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59167, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/.well-known/assetlinks.json", "localhostname": "WAFirewall", "localstarttime": "1714712375724 ", "message": "<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=22.115.5.100 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=229.104.63.28 spt=59167 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=229.104.63.28 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "SLASH_DOT_IN_URL", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "barracuda_waf", "cef", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:66.249.66.197", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "vendorcode": "14", "streamName": "barracuda_waf", "clientIP": "229.104.63.28", "serverIP": "22.115.5.100", "userName": "-" }
Create a JSON artifact from the message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=22.115.5.100 dpt=443 act=DENY msg=["-"] duser="-" src=229.104.63.28 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=229.104.63.28 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=22.115.5.100 dpt=443 act=DENY msg=["-"] duser="-" src=229.104.63.28 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=229.104.63.28 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59167 facilitycode: 23 facilitylabel: local7 fqdn: /.well-known/assetlinks.json localhostname: WAFirewall localstarttime: 1714712375724 messagetype: SLASH_DOT_IN_URL priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:66.249.66.197', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] vendorcode: 14 streamName: barracuda_waf clientIP: 229.104.63.28 serverIP: 22.115.5.100 userName: -
Explain this syslog message
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=70.42.89.97 dst=189.191.188.231 protocol=tcp sport=37118 dport=443 decision=blocked
{ "action": "block", "clientport": 37118, "message": "<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=70.42.89.97 dst=189.191.188.231 protocol=tcp sport=37118 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "70.42.89.97", "serverIP": "189.191.188.231" }
Create a JSON artifact from the message
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=70.42.89.97 dst=189.191.188.231 protocol=tcp sport=37118 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=70.42.89.97 dst=189.191.188.231 protocol=tcp sport=37118 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 37118 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 70.42.89.97 serverIP: 189.191.188.231
Explain this syslog message
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=100.223.120.92 dst=120.36.110.253 protocol=tcp sport=37118 dport=443 decision=blocked
{ "action": "block", "clientport": 37118, "message": "<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=100.223.120.92 dst=120.36.110.253 protocol=tcp sport=37118 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "100.223.120.92", "serverIP": "120.36.110.253" }
Create a JSON artifact from the message
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=100.223.120.92 dst=120.36.110.253 protocol=tcp sport=37118 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=100.223.120.92 dst=120.36.110.253 protocol=tcp sport=37118 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 37118 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 100.223.120.92 serverIP: 120.36.110.253
Explain this syslog message
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=66.227.56.246 dst=140.215.111.160 protocol=tcp sport=37118 dport=443 decision=blocked
{ "action": "block", "clientport": 37118, "message": "<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=66.227.56.246 dst=140.215.111.160 protocol=tcp sport=37118 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "66.227.56.246", "serverIP": "140.215.111.160" }
Create a JSON artifact from the message
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=66.227.56.246 dst=140.215.111.160 protocol=tcp sport=37118 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=66.227.56.246 dst=140.215.111.160 protocol=tcp sport=37118 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 37118 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 66.227.56.246 serverIP: 140.215.111.160
Explain this syslog message
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=152.174.137.114 dst=214.92.160.184 protocol=tcp sport=37118 dport=443 decision=blocked
{ "action": "block", "clientport": 37118, "message": "<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=152.174.137.114 dst=214.92.160.184 protocol=tcp sport=37118 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "152.174.137.114", "serverIP": "214.92.160.184" }
Create a JSON artifact from the message
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=152.174.137.114 dst=214.92.160.184 protocol=tcp sport=37118 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=152.174.137.114 dst=214.92.160.184 protocol=tcp sport=37118 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 37118 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 152.174.137.114 serverIP: 214.92.160.184
Explain this syslog message
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=169.197.226.62 dst=2.193.60.83 protocol=icmp type=0 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=169.197.226.62 dst=2.193.60.83 protocol=icmp type=0 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "protocol": 1, "streamName": "meraki_l7_firewall", "clientIP": "169.197.226.62", "serverIP": "2.193.60.83" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=169.197.226.62 dst=2.193.60.83 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=169.197.226.62 dst=2.193.60.83 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior protocol: 1 streamName: meraki_l7_firewall clientIP: 169.197.226.62 serverIP: 2.193.60.83
Explain this syslog message
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=171.22.20.177 dst=78.89.230.136 protocol=icmp type=0 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=171.22.20.177 dst=78.89.230.136 protocol=icmp type=0 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "protocol": 1, "streamName": "meraki_l7_firewall", "clientIP": "171.22.20.177", "serverIP": "78.89.230.136" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=171.22.20.177 dst=78.89.230.136 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=171.22.20.177 dst=78.89.230.136 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior protocol: 1 streamName: meraki_l7_firewall clientIP: 171.22.20.177 serverIP: 78.89.230.136
Explain this syslog message
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=183.154.180.219 dst=228.21.182.135 protocol=icmp type=0 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=183.154.180.219 dst=228.21.182.135 protocol=icmp type=0 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "protocol": 1, "streamName": "meraki_l7_firewall", "clientIP": "183.154.180.219", "serverIP": "228.21.182.135" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=183.154.180.219 dst=228.21.182.135 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=183.154.180.219 dst=228.21.182.135 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior protocol: 1 streamName: meraki_l7_firewall clientIP: 183.154.180.219 serverIP: 228.21.182.135
Explain this syslog message
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=98.119.156.145 dst=61.157.48.114 protocol=icmp type=0 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=98.119.156.145 dst=61.157.48.114 protocol=icmp type=0 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "protocol": 1, "streamName": "meraki_l7_firewall", "clientIP": "98.119.156.145", "serverIP": "61.157.48.114" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=98.119.156.145 dst=61.157.48.114 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=98.119.156.145 dst=61.157.48.114 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior protocol: 1 streamName: meraki_l7_firewall clientIP: 98.119.156.145 serverIP: 61.157.48.114
Explain this syslog message
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=132.74.50.10 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=146.120.214.209 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=146.120.214.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "ProxyIP:154.89.5.98", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=132.74.50.10 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=146.120.214.209 spt=52764 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=146.120.214.209 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1673467978899 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 52764, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "146.120.214.209", "serverIP": "132.74.50.10", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=132.74.50.10 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=146.120.214.209 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=146.120.214.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=132.74.50.10 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=146.120.214.209 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=146.120.214.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:154.89.5.98', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1673467978899 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 52764 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 146.120.214.209 serverIP: 132.74.50.10 userName: -
Explain this syslog message
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=64.157.153.67 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=46.129.207.118 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.129.207.118 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "ProxyIP:154.89.5.98", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=64.157.153.67 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=46.129.207.118 spt=52764 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.129.207.118 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1673467978899 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 52764, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "46.129.207.118", "serverIP": "64.157.153.67", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=64.157.153.67 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=46.129.207.118 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.129.207.118 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=64.157.153.67 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=46.129.207.118 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.129.207.118 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:154.89.5.98', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1673467978899 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 52764 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 46.129.207.118 serverIP: 64.157.153.67 userName: -
Explain this syslog message
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=193.109.44.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=203.40.69.236 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=203.40.69.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:183.136.225.32", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=193.109.44.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=203.40.69.236 spt=10391 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0\" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=203.40.69.236 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1673467984741 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 10391, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "203.40.69.236", "serverIP": "193.109.44.208", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=193.109.44.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=203.40.69.236 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=203.40.69.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=193.109.44.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=203.40.69.236 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=203.40.69.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:183.136.225.32', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1673467984741 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 10391 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 203.40.69.236 serverIP: 193.109.44.208 userName: -
Explain this syslog message
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.12.212.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=225.7.42.135 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.7.42.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:183.136.225.32", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.12.212.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=225.7.42.135 spt=10391 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0\" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.7.42.135 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1673467984741 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 10391, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "225.7.42.135", "serverIP": "42.12.212.121", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.12.212.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=225.7.42.135 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.7.42.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.12.212.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=225.7.42.135 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.7.42.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:183.136.225.32', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1673467984741 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 10391 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 225.7.42.135 serverIP: 42.12.212.121 userName: -
Explain this syslog message
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.9.227.12 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=82.222.185.138 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=82.222.185.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:183.136.225.32", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.9.227.12 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=82.222.185.138 spt=10391 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0\" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=82.222.185.138 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1673467984741 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 10391, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "82.222.185.138", "serverIP": "146.9.227.12", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.9.227.12 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=82.222.185.138 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=82.222.185.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.9.227.12 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=82.222.185.138 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=82.222.185.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:183.136.225.32', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1673467984741 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 10391 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 82.222.185.138 serverIP: 146.9.227.12 userName: -
Explain this syslog message
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=253.121.64.192 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=66.200.50.1 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=66.200.50.1 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "ProxyIP:154.89.5.98", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=253.121.64.192 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=66.200.50.1 spt=52764 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=66.200.50.1 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1673467978899 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 52764, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "66.200.50.1", "serverIP": "253.121.64.192", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=253.121.64.192 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=66.200.50.1 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=66.200.50.1 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message