input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=44.168.110.9 dst=226.202.173.3 protocol=tcp sport=56116 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661780063.328207591 NORDC_MX400_1 l7_firewall src=44.168.110.9 dst=226.202.173.3 protocol=tcp sport=56116 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56116
protocol: 6
streamName: meraki_l7_firewall
clientIP: 44.168.110.9
serverIP: 226.202.173.3 | Explain this syslog message |
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=45.20.196.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.239.210.106 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.239.210.106 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:5.188.86.227",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=45.20.196.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=83.239.210.106 spt=50572 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36\" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.239.210.106 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661014052606 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 50572,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "83.239.210.106",
"serverIP": "45.20.196.26",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=45.20.196.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.239.210.106 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.239.210.106 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=45.20.196.26 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=83.239.210.106 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=83.239.210.106 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:5.188.86.227', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661014052606
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 50572
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 83.239.210.106
serverIP: 45.20.196.26
userName: - | Explain this syslog message |
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=190.54.162.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.174.112.232 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.174.112.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:5.188.86.227",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=190.54.162.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=56.174.112.232 spt=50572 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36\" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.174.112.232 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661014052606 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 50572,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "56.174.112.232",
"serverIP": "190.54.162.207",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=190.54.162.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.174.112.232 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.174.112.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=190.54.162.207 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.174.112.232 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.174.112.232 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:5.188.86.227', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661014052606
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 50572
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 56.174.112.232
serverIP: 190.54.162.207
userName: - | Explain this syslog message |
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=243.71.248.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=138.151.110.39 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=138.151.110.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:5.188.86.227",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=243.71.248.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=138.151.110.39 spt=50572 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36\" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=138.151.110.39 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661014052606 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 50572,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "138.151.110.39",
"serverIP": "243.71.248.21",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=243.71.248.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=138.151.110.39 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=138.151.110.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 20 11:47:32 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=243.71.248.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=138.151.110.39 spt=50572 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 20 2022 11:47:32 rt=1661014052606 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.151 Whale/3.14.134.62 Safari/537.36" dvchost=WAFirewall externalId=182bc270efe-b3cd7b1b cn2=50572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=138.151.110.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:5.188.86.227', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661014052606
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 50572
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 138.151.110.39
serverIP: 243.71.248.21
userName: - | Explain this syslog message |
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=209.123.71.209 dpt=443 act=DENY msg=["-"] duser="-" src=147.6.179.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=147.6.179.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 35295,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/.well-known/assetlinks.json",
"localhostname": "WAFirewall",
"localstarttime": "1717708299924 ",
"message": "<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=209.123.71.209 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=147.6.179.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36\" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=147.6.179.7 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SLASH_DOT_IN_URL",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:209.85.238.163",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "14",
"streamName": "barracuda_waf",
"clientIP": "147.6.179.7",
"serverIP": "209.123.71.209",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=209.123.71.209 dpt=443 act=DENY msg=["-"] duser="-" src=147.6.179.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=147.6.179.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=209.123.71.209 dpt=443 act=DENY msg=["-"] duser="-" src=147.6.179.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=147.6.179.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35295
facilitycode: 23
facilitylabel: local7
fqdn: /.well-known/assetlinks.json
localhostname: WAFirewall
localstarttime: 1717708299924
messagetype: SLASH_DOT_IN_URL
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:209.85.238.163', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 14
streamName: barracuda_waf
clientIP: 147.6.179.7
serverIP: 209.123.71.209
userName: - | Explain this syslog message |
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=150.228.180.189 dpt=443 act=DENY msg=["-"] duser="-" src=236.15.15.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=236.15.15.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 35295,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/.well-known/assetlinks.json",
"localhostname": "WAFirewall",
"localstarttime": "1717708299924 ",
"message": "<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=150.228.180.189 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=236.15.15.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36\" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=236.15.15.7 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SLASH_DOT_IN_URL",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:209.85.238.163",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "14",
"streamName": "barracuda_waf",
"clientIP": "236.15.15.7",
"serverIP": "150.228.180.189",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=150.228.180.189 dpt=443 act=DENY msg=["-"] duser="-" src=236.15.15.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=236.15.15.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=150.228.180.189 dpt=443 act=DENY msg=["-"] duser="-" src=236.15.15.7 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=236.15.15.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35295
facilitycode: 23
facilitylabel: local7
fqdn: /.well-known/assetlinks.json
localhostname: WAFirewall
localstarttime: 1717708299924
messagetype: SLASH_DOT_IN_URL
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:209.85.238.163', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 14
streamName: barracuda_waf
clientIP: 236.15.15.7
serverIP: 150.228.180.189
userName: - | Explain this syslog message |
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=68.220.12.66 dpt=443 act=DENY msg=["-"] duser="-" src=29.77.144.62 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.77.144.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 35295,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/.well-known/assetlinks.json",
"localhostname": "WAFirewall",
"localstarttime": "1717708299924 ",
"message": "<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=68.220.12.66 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=29.77.144.62 spt=35295 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36\" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.77.144.62 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SLASH_DOT_IN_URL",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:209.85.238.163",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "14",
"streamName": "barracuda_waf",
"clientIP": "29.77.144.62",
"serverIP": "68.220.12.66",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=68.220.12.66 dpt=443 act=DENY msg=["-"] duser="-" src=29.77.144.62 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.77.144.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 6 16:11:39 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=68.220.12.66 dpt=443 act=DENY msg=["-"] duser="-" src=29.77.144.62 spt=35295 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 06 2024 16:11:39 rt=1717708299924 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36" dvchost=WAFirewall externalId=18fef649e94-17cfa66c cn2=35295 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.77.144.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35295
facilitycode: 23
facilitylabel: local7
fqdn: /.well-known/assetlinks.json
localhostname: WAFirewall
localstarttime: 1717708299924
messagetype: SLASH_DOT_IN_URL
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:209.85.238.163', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 14
streamName: barracuda_waf
clientIP: 29.77.144.62
serverIP: 68.220.12.66
userName: - | Explain this syslog message |
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=27.131.217.80 dst=107.152.15.148 protocol=tcp sport=58755 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=27.131.217.80 dst=107.152.15.148 protocol=tcp sport=58755 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58755,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "27.131.217.80",
"serverIP": "107.152.15.148"
} | Create a JSON artifact from the message |
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=27.131.217.80 dst=107.152.15.148 protocol=tcp sport=58755 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=27.131.217.80 dst=107.152.15.148 protocol=tcp sport=58755 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58755
protocol: 6
streamName: meraki_l7_firewall
clientIP: 27.131.217.80
serverIP: 107.152.15.148 | Explain this syslog message |
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=71.185.200.39 dst=80.142.83.176 protocol=tcp sport=58755 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=71.185.200.39 dst=80.142.83.176 protocol=tcp sport=58755 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58755,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "71.185.200.39",
"serverIP": "80.142.83.176"
} | Create a JSON artifact from the message |
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=71.185.200.39 dst=80.142.83.176 protocol=tcp sport=58755 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=71.185.200.39 dst=80.142.83.176 protocol=tcp sport=58755 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58755
protocol: 6
streamName: meraki_l7_firewall
clientIP: 71.185.200.39
serverIP: 80.142.83.176 | Explain this syslog message |
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=240.138.90.111 dst=65.114.132.118 protocol=tcp sport=58755 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=240.138.90.111 dst=65.114.132.118 protocol=tcp sport=58755 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58755,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "240.138.90.111",
"serverIP": "65.114.132.118"
} | Create a JSON artifact from the message |
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=240.138.90.111 dst=65.114.132.118 protocol=tcp sport=58755 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=240.138.90.111 dst=65.114.132.118 protocol=tcp sport=58755 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58755
protocol: 6
streamName: meraki_l7_firewall
clientIP: 240.138.90.111
serverIP: 65.114.132.118 | Explain this syslog message |
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=117.247.205.218 dst=91.166.151.110 protocol=tcp sport=58755 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=117.247.205.218 dst=91.166.151.110 protocol=tcp sport=58755 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58755,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "117.247.205.218",
"serverIP": "91.166.151.110"
} | Create a JSON artifact from the message |
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=117.247.205.218 dst=91.166.151.110 protocol=tcp sport=58755 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=70.183.231.238 1 1656752593.332424566 M59_MX67C_Pensacola l7_firewall src=117.247.205.218 dst=91.166.151.110 protocol=tcp sport=58755 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58755
protocol: 6
streamName: meraki_l7_firewall
clientIP: 117.247.205.218
serverIP: 91.166.151.110 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=49.148.120.131 dst=145.58.50.91 protocol=tcp sport=60822 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=49.148.120.131 dst=145.58.50.91 protocol=tcp sport=60822 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60822,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "49.148.120.131",
"serverIP": "145.58.50.91"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=49.148.120.131 dst=145.58.50.91 protocol=tcp sport=60822 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=49.148.120.131 dst=145.58.50.91 protocol=tcp sport=60822 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60822
protocol: 6
streamName: meraki_l7_firewall
clientIP: 49.148.120.131
serverIP: 145.58.50.91 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=76.226.20.75 dst=109.149.39.108 protocol=tcp sport=60822 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=76.226.20.75 dst=109.149.39.108 protocol=tcp sport=60822 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60822,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "76.226.20.75",
"serverIP": "109.149.39.108"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=76.226.20.75 dst=109.149.39.108 protocol=tcp sport=60822 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=76.226.20.75 dst=109.149.39.108 protocol=tcp sport=60822 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60822
protocol: 6
streamName: meraki_l7_firewall
clientIP: 76.226.20.75
serverIP: 109.149.39.108 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=244.101.71.201 dst=223.126.106.242 protocol=tcp sport=60822 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=244.101.71.201 dst=223.126.106.242 protocol=tcp sport=60822 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60822,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "244.101.71.201",
"serverIP": "223.126.106.242"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=244.101.71.201 dst=223.126.106.242 protocol=tcp sport=60822 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=244.101.71.201 dst=223.126.106.242 protocol=tcp sport=60822 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60822
protocol: 6
streamName: meraki_l7_firewall
clientIP: 244.101.71.201
serverIP: 223.126.106.242 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=124.178.162.9 dst=251.36.81.85 protocol=tcp sport=60822 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=124.178.162.9 dst=251.36.81.85 protocol=tcp sport=60822 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60822,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "124.178.162.9",
"serverIP": "251.36.81.85"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=124.178.162.9 dst=251.36.81.85 protocol=tcp sport=60822 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1656752594.955744299 M83_MX67C_MuscleShoals l7_firewall src=124.178.162.9 dst=251.36.81.85 protocol=tcp sport=60822 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60822
protocol: 6
streamName: meraki_l7_firewall
clientIP: 124.178.162.9
serverIP: 251.36.81.85 | Explain this syslog message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=13.31.118.171 dpt=443 act=DENY msg=["-"] duser="-" src=12.244.127.21 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.244.127.21 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59167,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/.well-known/assetlinks.json",
"localhostname": "WAFirewall",
"localstarttime": "1714712375724 ",
"message": "<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=13.31.118.171 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=12.244.127.21 spt=59167 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.244.127.21 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SLASH_DOT_IN_URL",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:66.249.66.197",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "14",
"streamName": "barracuda_waf",
"clientIP": "12.244.127.21",
"serverIP": "13.31.118.171",
"userName": "-"
} | Create a JSON artifact from the message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=13.31.118.171 dpt=443 act=DENY msg=["-"] duser="-" src=12.244.127.21 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.244.127.21 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=13.31.118.171 dpt=443 act=DENY msg=["-"] duser="-" src=12.244.127.21 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.244.127.21 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59167
facilitycode: 23
facilitylabel: local7
fqdn: /.well-known/assetlinks.json
localhostname: WAFirewall
localstarttime: 1714712375724
messagetype: SLASH_DOT_IN_URL
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:66.249.66.197', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 14
streamName: barracuda_waf
clientIP: 12.244.127.21
serverIP: 13.31.118.171
userName: - | Explain this syslog message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=249.194.147.133 dpt=443 act=DENY msg=["-"] duser="-" src=228.48.249.234 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=228.48.249.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59167,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/.well-known/assetlinks.json",
"localhostname": "WAFirewall",
"localstarttime": "1714712375724 ",
"message": "<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=249.194.147.133 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=228.48.249.234 spt=59167 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=228.48.249.234 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SLASH_DOT_IN_URL",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:66.249.66.197",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "14",
"streamName": "barracuda_waf",
"clientIP": "228.48.249.234",
"serverIP": "249.194.147.133",
"userName": "-"
} | Create a JSON artifact from the message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=249.194.147.133 dpt=443 act=DENY msg=["-"] duser="-" src=228.48.249.234 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=228.48.249.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=249.194.147.133 dpt=443 act=DENY msg=["-"] duser="-" src=228.48.249.234 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=228.48.249.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59167
facilitycode: 23
facilitylabel: local7
fqdn: /.well-known/assetlinks.json
localhostname: WAFirewall
localstarttime: 1714712375724
messagetype: SLASH_DOT_IN_URL
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:66.249.66.197', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 14
streamName: barracuda_waf
clientIP: 228.48.249.234
serverIP: 249.194.147.133
userName: - | Explain this syslog message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=5.171.116.194 dpt=443 act=DENY msg=["-"] duser="-" src=151.162.159.198 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.162.159.198 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59167,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/.well-known/assetlinks.json",
"localhostname": "WAFirewall",
"localstarttime": "1714712375724 ",
"message": "<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=5.171.116.194 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=151.162.159.198 spt=59167 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.162.159.198 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SLASH_DOT_IN_URL",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:66.249.66.197",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "14",
"streamName": "barracuda_waf",
"clientIP": "151.162.159.198",
"serverIP": "5.171.116.194",
"userName": "-"
} | Create a JSON artifact from the message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=5.171.116.194 dpt=443 act=DENY msg=["-"] duser="-" src=151.162.159.198 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.162.159.198 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=5.171.116.194 dpt=443 act=DENY msg=["-"] duser="-" src=151.162.159.198 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.162.159.198 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59167
facilitycode: 23
facilitylabel: local7
fqdn: /.well-known/assetlinks.json
localhostname: WAFirewall
localstarttime: 1714712375724
messagetype: SLASH_DOT_IN_URL
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:66.249.66.197', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 14
streamName: barracuda_waf
clientIP: 151.162.159.198
serverIP: 5.171.116.194
userName: - | Explain this syslog message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=81.0.202.102 dpt=443 act=DENY msg=["-"] duser="-" src=38.208.235.99 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=38.208.235.99 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59167,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/.well-known/assetlinks.json",
"localhostname": "WAFirewall",
"localstarttime": "1714712375724 ",
"message": "<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=81.0.202.102 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=38.208.235.99 spt=59167 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=38.208.235.99 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SLASH_DOT_IN_URL",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:66.249.66.197",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "14",
"streamName": "barracuda_waf",
"clientIP": "38.208.235.99",
"serverIP": "81.0.202.102",
"userName": "-"
} | Create a JSON artifact from the message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=81.0.202.102 dpt=443 act=DENY msg=["-"] duser="-" src=38.208.235.99 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=38.208.235.99 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=81.0.202.102 dpt=443 act=DENY msg=["-"] duser="-" src=38.208.235.99 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=38.208.235.99 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59167
facilitycode: 23
facilitylabel: local7
fqdn: /.well-known/assetlinks.json
localhostname: WAFirewall
localstarttime: 1714712375724
messagetype: SLASH_DOT_IN_URL
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:66.249.66.197', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 14
streamName: barracuda_waf
clientIP: 38.208.235.99
serverIP: 81.0.202.102
userName: - | Explain this syslog message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=22.115.5.100 dpt=443 act=DENY msg=["-"] duser="-" src=229.104.63.28 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=229.104.63.28 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59167,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/.well-known/assetlinks.json",
"localhostname": "WAFirewall",
"localstarttime": "1714712375724 ",
"message": "<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=22.115.5.100 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=229.104.63.28 spt=59167 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication=\"Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=229.104.63.28 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SLASH_DOT_IN_URL",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:66.249.66.197",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "14",
"streamName": "barracuda_waf",
"clientIP": "229.104.63.28",
"serverIP": "22.115.5.100",
"userName": "-"
} | Create a JSON artifact from the message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=22.115.5.100 dpt=443 act=DENY msg=["-"] duser="-" src=229.104.63.28 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=229.104.63.28 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>May 2 23:59:35 WAFirewall CEF:0|Barracuda|WAF|1220|14|SLASH_DOT_IN_URL|1|cat=WF dst=22.115.5.100 dpt=443 act=DENY msg=["-"] duser="-" src=229.104.63.28 spt=59167 requestMethod=GET app=TLSv1.3 requestContext="-" start=May 02 2024 23:59:35 rt=1714712375724 request=/.well-known/assetlinks.json requestClientApplication="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=18f3cd271ab-e9a351c8 cn2=59167 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=229.104.63.28 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59167
facilitycode: 23
facilitylabel: local7
fqdn: /.well-known/assetlinks.json
localhostname: WAFirewall
localstarttime: 1714712375724
messagetype: SLASH_DOT_IN_URL
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:66.249.66.197', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 14
streamName: barracuda_waf
clientIP: 229.104.63.28
serverIP: 22.115.5.100
userName: - | Explain this syslog message |
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=70.42.89.97 dst=189.191.188.231 protocol=tcp sport=37118 dport=443 decision=blocked | {
"action": "block",
"clientport": 37118,
"message": "<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=70.42.89.97 dst=189.191.188.231 protocol=tcp sport=37118 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "70.42.89.97",
"serverIP": "189.191.188.231"
} | Create a JSON artifact from the message |
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=70.42.89.97 dst=189.191.188.231 protocol=tcp sport=37118 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=70.42.89.97 dst=189.191.188.231 protocol=tcp sport=37118 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 37118
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 70.42.89.97
serverIP: 189.191.188.231 | Explain this syslog message |
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=100.223.120.92 dst=120.36.110.253 protocol=tcp sport=37118 dport=443 decision=blocked | {
"action": "block",
"clientport": 37118,
"message": "<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=100.223.120.92 dst=120.36.110.253 protocol=tcp sport=37118 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "100.223.120.92",
"serverIP": "120.36.110.253"
} | Create a JSON artifact from the message |
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=100.223.120.92 dst=120.36.110.253 protocol=tcp sport=37118 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=100.223.120.92 dst=120.36.110.253 protocol=tcp sport=37118 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 37118
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 100.223.120.92
serverIP: 120.36.110.253 | Explain this syslog message |
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=66.227.56.246 dst=140.215.111.160 protocol=tcp sport=37118 dport=443 decision=blocked | {
"action": "block",
"clientport": 37118,
"message": "<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=66.227.56.246 dst=140.215.111.160 protocol=tcp sport=37118 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "66.227.56.246",
"serverIP": "140.215.111.160"
} | Create a JSON artifact from the message |
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=66.227.56.246 dst=140.215.111.160 protocol=tcp sport=37118 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=66.227.56.246 dst=140.215.111.160 protocol=tcp sport=37118 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 37118
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 66.227.56.246
serverIP: 140.215.111.160 | Explain this syslog message |
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=152.174.137.114 dst=214.92.160.184 protocol=tcp sport=37118 dport=443 decision=blocked | {
"action": "block",
"clientport": 37118,
"message": "<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=152.174.137.114 dst=214.92.160.184 protocol=tcp sport=37118 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "152.174.137.114",
"serverIP": "214.92.160.184"
} | Create a JSON artifact from the message |
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=152.174.137.114 dst=214.92.160.184 protocol=tcp sport=37118 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.242.154.73 1 1686316006.016104104 M54_MX67C_Dothan l7_firewall src=152.174.137.114 dst=214.92.160.184 protocol=tcp sport=37118 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 37118
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 152.174.137.114
serverIP: 214.92.160.184 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=169.197.226.62 dst=2.193.60.83 protocol=icmp type=0 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=169.197.226.62 dst=2.193.60.83 protocol=icmp type=0 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"protocol": 1,
"streamName": "meraki_l7_firewall",
"clientIP": "169.197.226.62",
"serverIP": "2.193.60.83"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=169.197.226.62 dst=2.193.60.83 protocol=icmp type=0 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=169.197.226.62 dst=2.193.60.83 protocol=icmp type=0 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
protocol: 1
streamName: meraki_l7_firewall
clientIP: 169.197.226.62
serverIP: 2.193.60.83 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=171.22.20.177 dst=78.89.230.136 protocol=icmp type=0 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=171.22.20.177 dst=78.89.230.136 protocol=icmp type=0 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"protocol": 1,
"streamName": "meraki_l7_firewall",
"clientIP": "171.22.20.177",
"serverIP": "78.89.230.136"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=171.22.20.177 dst=78.89.230.136 protocol=icmp type=0 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=171.22.20.177 dst=78.89.230.136 protocol=icmp type=0 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
protocol: 1
streamName: meraki_l7_firewall
clientIP: 171.22.20.177
serverIP: 78.89.230.136 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=183.154.180.219 dst=228.21.182.135 protocol=icmp type=0 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=183.154.180.219 dst=228.21.182.135 protocol=icmp type=0 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"protocol": 1,
"streamName": "meraki_l7_firewall",
"clientIP": "183.154.180.219",
"serverIP": "228.21.182.135"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=183.154.180.219 dst=228.21.182.135 protocol=icmp type=0 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=183.154.180.219 dst=228.21.182.135 protocol=icmp type=0 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
protocol: 1
streamName: meraki_l7_firewall
clientIP: 183.154.180.219
serverIP: 228.21.182.135 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=98.119.156.145 dst=61.157.48.114 protocol=icmp type=0 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=98.119.156.145 dst=61.157.48.114 protocol=icmp type=0 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"protocol": 1,
"streamName": "meraki_l7_firewall",
"clientIP": "98.119.156.145",
"serverIP": "61.157.48.114"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=98.119.156.145 dst=61.157.48.114 protocol=icmp type=0 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674018851.173308805 NORDC_MX400_1 l7_firewall src=98.119.156.145 dst=61.157.48.114 protocol=icmp type=0 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
protocol: 1
streamName: meraki_l7_firewall
clientIP: 98.119.156.145
serverIP: 61.157.48.114 | Explain this syslog message |
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=132.74.50.10 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=146.120.214.209 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=146.120.214.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:154.89.5.98",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=132.74.50.10 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=146.120.214.209 spt=52764 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=146.120.214.209 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1673467978899 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 52764,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "146.120.214.209",
"serverIP": "132.74.50.10",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=132.74.50.10 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=146.120.214.209 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=146.120.214.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=132.74.50.10 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=146.120.214.209 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=146.120.214.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:154.89.5.98', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1673467978899
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 52764
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 146.120.214.209
serverIP: 132.74.50.10
userName: - | Explain this syslog message |
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=64.157.153.67 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=46.129.207.118 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.129.207.118 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:154.89.5.98",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=64.157.153.67 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=46.129.207.118 spt=52764 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.129.207.118 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1673467978899 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 52764,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "46.129.207.118",
"serverIP": "64.157.153.67",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=64.157.153.67 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=46.129.207.118 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.129.207.118 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=64.157.153.67 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=46.129.207.118 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=46.129.207.118 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:154.89.5.98', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1673467978899
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 52764
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 46.129.207.118
serverIP: 64.157.153.67
userName: - | Explain this syslog message |
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=193.109.44.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=203.40.69.236 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=203.40.69.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:183.136.225.32",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=193.109.44.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=203.40.69.236 spt=10391 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0\" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=203.40.69.236 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1673467984741 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 10391,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "203.40.69.236",
"serverIP": "193.109.44.208",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=193.109.44.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=203.40.69.236 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=203.40.69.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=193.109.44.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=203.40.69.236 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=203.40.69.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:183.136.225.32', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1673467984741
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 10391
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 203.40.69.236
serverIP: 193.109.44.208
userName: - | Explain this syslog message |
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.12.212.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=225.7.42.135 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.7.42.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:183.136.225.32",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.12.212.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=225.7.42.135 spt=10391 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0\" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.7.42.135 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1673467984741 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 10391,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "225.7.42.135",
"serverIP": "42.12.212.121",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.12.212.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=225.7.42.135 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.7.42.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.12.212.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=225.7.42.135 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.7.42.135 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:183.136.225.32', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1673467984741
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 10391
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 225.7.42.135
serverIP: 42.12.212.121
userName: - | Explain this syslog message |
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.9.227.12 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=82.222.185.138 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=82.222.185.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:183.136.225.32",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.9.227.12 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=82.222.185.138 spt=10391 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0\" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=82.222.185.138 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1673467984741 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 10391,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "82.222.185.138",
"serverIP": "146.9.227.12",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.9.227.12 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=82.222.185.138 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=82.222.185.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 11 14:13:04 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.9.227.12 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=82.222.185.138 spt=10391 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:13:04 rt=1673467984741 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0" dvchost=WAFirewall externalId=185a276fb49-4af46eb6 cn2=10391 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=82.222.185.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:183.136.225.32', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1673467984741
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 10391
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 82.222.185.138
serverIP: 146.9.227.12
userName: - | Explain this syslog message |
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=253.121.64.192 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=66.200.50.1 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=66.200.50.1 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:154.89.5.98",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=253.121.64.192 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=66.200.50.1 spt=52764 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=66.200.50.1 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1673467978899 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 52764,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "66.200.50.1",
"serverIP": "253.121.64.192",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=253.121.64.192 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=66.200.50.1 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=66.200.50.1 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.