input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=138.69.165.99 dst=148.227.163.233 protocol=tcp sport=60509 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 60509 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 138.69.165.99 serverIP: 148.227.163.233
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=28.137.4.35 dst=91.44.254.197 protocol=tcp sport=60509 dport=443 decision=blocked
{ "action": "block", "clientport": 60509, "message": "<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=28.137.4.35 dst=91.44.254.197 protocol=tcp sport=60509 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "28.137.4.35", "serverIP": "91.44.254.197" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=28.137.4.35 dst=91.44.254.197 protocol=tcp sport=60509 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=28.137.4.35 dst=91.44.254.197 protocol=tcp sport=60509 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 60509 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 28.137.4.35 serverIP: 91.44.254.197
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=234.221.108.17 dst=70.204.228.207 protocol=tcp sport=60509 dport=443 decision=blocked
{ "action": "block", "clientport": 60509, "message": "<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=234.221.108.17 dst=70.204.228.207 protocol=tcp sport=60509 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "234.221.108.17", "serverIP": "70.204.228.207" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=234.221.108.17 dst=70.204.228.207 protocol=tcp sport=60509 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=234.221.108.17 dst=70.204.228.207 protocol=tcp sport=60509 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 60509 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 234.221.108.17 serverIP: 70.204.228.207
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=110.254.124.15 dst=134.226.14.166 protocol=tcp sport=60509 dport=443 decision=blocked
{ "action": "block", "clientport": 60509, "message": "<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=110.254.124.15 dst=134.226.14.166 protocol=tcp sport=60509 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "110.254.124.15", "serverIP": "134.226.14.166" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=110.254.124.15 dst=134.226.14.166 protocol=tcp sport=60509 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=110.254.124.15 dst=134.226.14.166 protocol=tcp sport=60509 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 60509 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 110.254.124.15 serverIP: 134.226.14.166
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=104.133.201.140 dst=100.53.97.184 protocol=tcp sport=64045 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=104.133.201.140 dst=100.53.97.184 protocol=tcp sport=64045 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 64045, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "104.133.201.140", "serverIP": "100.53.97.184" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=104.133.201.140 dst=100.53.97.184 protocol=tcp sport=64045 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=104.133.201.140 dst=100.53.97.184 protocol=tcp sport=64045 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 64045 protocol: 6 streamName: meraki_l7_firewall clientIP: 104.133.201.140 serverIP: 100.53.97.184
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=176.102.55.140 dst=92.224.93.248 protocol=tcp sport=64045 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=176.102.55.140 dst=92.224.93.248 protocol=tcp sport=64045 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 64045, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "176.102.55.140", "serverIP": "92.224.93.248" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=176.102.55.140 dst=92.224.93.248 protocol=tcp sport=64045 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=176.102.55.140 dst=92.224.93.248 protocol=tcp sport=64045 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 64045 protocol: 6 streamName: meraki_l7_firewall clientIP: 176.102.55.140 serverIP: 92.224.93.248
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=221.226.46.208 dst=161.228.75.161 protocol=tcp sport=64045 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=221.226.46.208 dst=161.228.75.161 protocol=tcp sport=64045 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 64045, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "221.226.46.208", "serverIP": "161.228.75.161" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=221.226.46.208 dst=161.228.75.161 protocol=tcp sport=64045 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=221.226.46.208 dst=161.228.75.161 protocol=tcp sport=64045 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 64045 protocol: 6 streamName: meraki_l7_firewall clientIP: 221.226.46.208 serverIP: 161.228.75.161
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=58.58.8.172 dst=42.6.48.192 protocol=tcp sport=64045 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=58.58.8.172 dst=42.6.48.192 protocol=tcp sport=64045 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 64045, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "58.58.8.172", "serverIP": "42.6.48.192" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=58.58.8.172 dst=42.6.48.192 protocol=tcp sport=64045 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=58.58.8.172 dst=42.6.48.192 protocol=tcp sport=64045 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 64045 protocol: 6 streamName: meraki_l7_firewall clientIP: 58.58.8.172 serverIP: 42.6.48.192
Explain this syslog message
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=159.79.237.223 dst=89.242.89.244 protocol=tcp sport=80 dport=56378 decision=blocked
{ "action": "block", "clientport": 56378, "message": "<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=159.79.237.223 dst=89.242.89.244 protocol=tcp sport=80 dport=56378 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 80, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "89.242.89.244", "serverIP": "159.79.237.223" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=159.79.237.223 dst=89.242.89.244 protocol=tcp sport=80 dport=56378 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=159.79.237.223 dst=89.242.89.244 protocol=tcp sport=80 dport=56378 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 56378 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 80 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 89.242.89.244 serverIP: 159.79.237.223
Explain this syslog message
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=119.22.227.175 dst=106.157.154.151 protocol=tcp sport=80 dport=56378 decision=blocked
{ "action": "block", "clientport": 56378, "message": "<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=119.22.227.175 dst=106.157.154.151 protocol=tcp sport=80 dport=56378 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 80, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "106.157.154.151", "serverIP": "119.22.227.175" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=119.22.227.175 dst=106.157.154.151 protocol=tcp sport=80 dport=56378 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=119.22.227.175 dst=106.157.154.151 protocol=tcp sport=80 dport=56378 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 56378 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 80 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 106.157.154.151 serverIP: 119.22.227.175
Explain this syslog message
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=157.125.44.93 dst=107.228.138.191 protocol=tcp sport=80 dport=56378 decision=blocked
{ "action": "block", "clientport": 56378, "message": "<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=157.125.44.93 dst=107.228.138.191 protocol=tcp sport=80 dport=56378 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 80, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "107.228.138.191", "serverIP": "157.125.44.93" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=157.125.44.93 dst=107.228.138.191 protocol=tcp sport=80 dport=56378 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=157.125.44.93 dst=107.228.138.191 protocol=tcp sport=80 dport=56378 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 56378 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 80 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 107.228.138.191 serverIP: 157.125.44.93
Explain this syslog message
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=62.208.249.247 dst=115.205.90.47 protocol=tcp sport=80 dport=56378 decision=blocked
{ "action": "block", "clientport": 56378, "message": "<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=62.208.249.247 dst=115.205.90.47 protocol=tcp sport=80 dport=56378 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 80, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "115.205.90.47", "serverIP": "62.208.249.247" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=62.208.249.247 dst=115.205.90.47 protocol=tcp sport=80 dport=56378 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=62.208.249.247 dst=115.205.90.47 protocol=tcp sport=80 dport=56378 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 56378 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 80 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 115.205.90.47 serverIP: 62.208.249.247
Explain this syslog message
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=157.190.242.230 dst=154.21.249.98 protocol=tcp sport=57206 dport=443 decision=blocked
{ "action": "block", "clientport": 57206, "message": "<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=157.190.242.230 dst=154.21.249.98 protocol=tcp sport=57206 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "157.190.242.230", "serverIP": "154.21.249.98" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=157.190.242.230 dst=154.21.249.98 protocol=tcp sport=57206 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=157.190.242.230 dst=154.21.249.98 protocol=tcp sport=57206 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57206 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 157.190.242.230 serverIP: 154.21.249.98
Explain this syslog message
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=242.113.108.105 dst=73.35.85.56 protocol=tcp sport=57206 dport=443 decision=blocked
{ "action": "block", "clientport": 57206, "message": "<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=242.113.108.105 dst=73.35.85.56 protocol=tcp sport=57206 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "242.113.108.105", "serverIP": "73.35.85.56" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=242.113.108.105 dst=73.35.85.56 protocol=tcp sport=57206 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=242.113.108.105 dst=73.35.85.56 protocol=tcp sport=57206 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57206 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 242.113.108.105 serverIP: 73.35.85.56
Explain this syslog message
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=64.122.214.97 dst=155.4.19.146 protocol=tcp sport=57206 dport=443 decision=blocked
{ "action": "block", "clientport": 57206, "message": "<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=64.122.214.97 dst=155.4.19.146 protocol=tcp sport=57206 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "64.122.214.97", "serverIP": "155.4.19.146" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=64.122.214.97 dst=155.4.19.146 protocol=tcp sport=57206 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=64.122.214.97 dst=155.4.19.146 protocol=tcp sport=57206 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57206 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 64.122.214.97 serverIP: 155.4.19.146
Explain this syslog message
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=17.198.182.2 dst=172.130.187.138 protocol=tcp sport=57206 dport=443 decision=blocked
{ "action": "block", "clientport": 57206, "message": "<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=17.198.182.2 dst=172.130.187.138 protocol=tcp sport=57206 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "17.198.182.2", "serverIP": "172.130.187.138" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=17.198.182.2 dst=172.130.187.138 protocol=tcp sport=57206 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=17.198.182.2 dst=172.130.187.138 protocol=tcp sport=57206 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57206 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 17.198.182.2 serverIP: 172.130.187.138
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=99.98.97.46 dst=1.128.85.230 protocol=icmp type=0 decision=blocked
{ "action": "block", "message": "<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=99.98.97.46 dst=1.128.85.230 protocol=icmp type=0 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 1, "senderhost": "192.168.2.250", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "99.98.97.46", "serverIP": "1.128.85.230" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=99.98.97.46 dst=1.128.85.230 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=99.98.97.46 dst=1.128.85.230 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block messagetype: anomalous_behavior program: l7_firewall protocol: 1 senderhost: 192.168.2.250 sensitivity: normal sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 99.98.97.46 serverIP: 1.128.85.230
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=64.24.51.227 dst=75.221.130.228 protocol=icmp type=0 decision=blocked
{ "action": "block", "message": "<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=64.24.51.227 dst=75.221.130.228 protocol=icmp type=0 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 1, "senderhost": "192.168.2.250", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "64.24.51.227", "serverIP": "75.221.130.228" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=64.24.51.227 dst=75.221.130.228 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=64.24.51.227 dst=75.221.130.228 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block messagetype: anomalous_behavior program: l7_firewall protocol: 1 senderhost: 192.168.2.250 sensitivity: normal sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 64.24.51.227 serverIP: 75.221.130.228
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=7.29.58.161 dst=182.15.213.200 protocol=icmp type=0 decision=blocked
{ "action": "block", "message": "<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=7.29.58.161 dst=182.15.213.200 protocol=icmp type=0 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 1, "senderhost": "192.168.2.250", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "7.29.58.161", "serverIP": "182.15.213.200" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=7.29.58.161 dst=182.15.213.200 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=7.29.58.161 dst=182.15.213.200 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block messagetype: anomalous_behavior program: l7_firewall protocol: 1 senderhost: 192.168.2.250 sensitivity: normal sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 7.29.58.161 serverIP: 182.15.213.200
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=159.229.133.171 dst=79.240.56.98 protocol=icmp type=0 decision=blocked
{ "action": "block", "message": "<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=159.229.133.171 dst=79.240.56.98 protocol=icmp type=0 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 1, "senderhost": "192.168.2.250", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "159.229.133.171", "serverIP": "79.240.56.98" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=159.229.133.171 dst=79.240.56.98 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=159.229.133.171 dst=79.240.56.98 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block messagetype: anomalous_behavior program: l7_firewall protocol: 1 senderhost: 192.168.2.250 sensitivity: normal sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 159.229.133.171 serverIP: 79.240.56.98
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=153.248.32.151 dst=186.42.189.141 protocol=tcp sport=59880 dport=443 decision=blocked
{ "action": "block", "clientport": 59880, "message": "<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=153.248.32.151 dst=186.42.189.141 protocol=tcp sport=59880 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "153.248.32.151", "serverIP": "186.42.189.141" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=153.248.32.151 dst=186.42.189.141 protocol=tcp sport=59880 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=153.248.32.151 dst=186.42.189.141 protocol=tcp sport=59880 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59880 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 153.248.32.151 serverIP: 186.42.189.141
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=155.38.54.41 dst=113.144.107.130 protocol=tcp sport=59880 dport=443 decision=blocked
{ "action": "block", "clientport": 59880, "message": "<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=155.38.54.41 dst=113.144.107.130 protocol=tcp sport=59880 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "155.38.54.41", "serverIP": "113.144.107.130" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=155.38.54.41 dst=113.144.107.130 protocol=tcp sport=59880 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=155.38.54.41 dst=113.144.107.130 protocol=tcp sport=59880 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59880 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 155.38.54.41 serverIP: 113.144.107.130
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=116.44.57.41 dst=182.165.115.128 protocol=tcp sport=59880 dport=443 decision=blocked
{ "action": "block", "clientport": 59880, "message": "<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=116.44.57.41 dst=182.165.115.128 protocol=tcp sport=59880 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "116.44.57.41", "serverIP": "182.165.115.128" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=116.44.57.41 dst=182.165.115.128 protocol=tcp sport=59880 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=116.44.57.41 dst=182.165.115.128 protocol=tcp sport=59880 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59880 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 116.44.57.41 serverIP: 182.165.115.128
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=194.176.113.50 dst=94.70.44.8 protocol=tcp sport=59880 dport=443 decision=blocked
{ "action": "block", "clientport": 59880, "message": "<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=194.176.113.50 dst=94.70.44.8 protocol=tcp sport=59880 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "194.176.113.50", "serverIP": "94.70.44.8" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=194.176.113.50 dst=94.70.44.8 protocol=tcp sport=59880 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=194.176.113.50 dst=94.70.44.8 protocol=tcp sport=59880 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59880 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 194.176.113.50 serverIP: 94.70.44.8
Explain this syslog message
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=163.204.223.15 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=145.60.117.2 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=145.60.117.2 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "barracuda_waf_MISSING_HOST_HEADER", "FollowUpAction:NONE", "ProxyIP:35.216.166.62", "RuleID:global", "RuleType:GLOBAL", "MISSING_HOST_HEADER" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=163.204.223.15 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser=\"-\" src=145.60.117.2 spt=50266 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=145.60.117.2 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675723400180 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MISSING_HOST_HEADER", "severitycode": 9, "fqdn": "/", "clientport": 50266, "vendorcode": "126", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "145.60.117.2", "serverIP": "163.204.223.15", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=163.204.223.15 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=145.60.117.2 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=145.60.117.2 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=163.204.223.15 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=145.60.117.2 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=145.60.117.2 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'barracuda_waf_MISSING_HOST_HEADER', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global', 'RuleType:GLOBAL', 'MISSING_HOST_HEADER'] productids: [0] sourceinfo: unknown localstarttime: 1675723400180 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MISSING_HOST_HEADER severitycode: 9 fqdn: / clientport: 50266 vendorcode: 126 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 145.60.117.2 serverIP: 163.204.223.15 userName: -
Explain this syslog message
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=221.104.107.237 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.110.45.144 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.110.45.144 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:35.216.166.62", "RuleID:global" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=221.104.107.237 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=97.110.45.144 spt=50350 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication=\"l9tcpid/v1.1.0\" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.110.45.144 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675723405418 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 50350, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "97.110.45.144", "serverIP": "221.104.107.237", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=221.104.107.237 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.110.45.144 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.110.45.144 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=221.104.107.237 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.110.45.144 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.110.45.144 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global'] productids: [0] sourceinfo: unknown localstarttime: 1675723405418 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 50350 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 97.110.45.144 serverIP: 221.104.107.237 userName: -
Explain this syslog message
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=210.150.105.200 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=218.72.228.133 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=218.72.228.133 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "barracuda_waf_MISSING_HOST_HEADER", "FollowUpAction:NONE", "ProxyIP:35.216.166.62", "RuleID:global", "RuleType:GLOBAL", "MISSING_HOST_HEADER" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=210.150.105.200 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser=\"-\" src=218.72.228.133 spt=50266 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=218.72.228.133 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675723400180 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MISSING_HOST_HEADER", "severitycode": 9, "fqdn": "/", "clientport": 50266, "vendorcode": "126", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "218.72.228.133", "serverIP": "210.150.105.200", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=210.150.105.200 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=218.72.228.133 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=218.72.228.133 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=210.150.105.200 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=218.72.228.133 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=218.72.228.133 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'barracuda_waf_MISSING_HOST_HEADER', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global', 'RuleType:GLOBAL', 'MISSING_HOST_HEADER'] productids: [0] sourceinfo: unknown localstarttime: 1675723400180 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MISSING_HOST_HEADER severitycode: 9 fqdn: / clientport: 50266 vendorcode: 126 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 218.72.228.133 serverIP: 210.150.105.200 userName: -
Explain this syslog message
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=108.28.7.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=217.53.39.63 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=217.53.39.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:35.216.166.62", "RuleID:global" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=108.28.7.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=217.53.39.63 spt=50350 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication=\"l9tcpid/v1.1.0\" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=217.53.39.63 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675723405418 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 50350, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "217.53.39.63", "serverIP": "108.28.7.236", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=108.28.7.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=217.53.39.63 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=217.53.39.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=108.28.7.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=217.53.39.63 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=217.53.39.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global'] productids: [0] sourceinfo: unknown localstarttime: 1675723405418 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 50350 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 217.53.39.63 serverIP: 108.28.7.236 userName: -
Explain this syslog message
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=176.204.106.13 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=195.226.239.114 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.226.239.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "barracuda_waf_MISSING_HOST_HEADER", "FollowUpAction:NONE", "ProxyIP:35.216.166.62", "RuleID:global", "RuleType:GLOBAL", "MISSING_HOST_HEADER" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=176.204.106.13 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser=\"-\" src=195.226.239.114 spt=50266 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.226.239.114 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675723400180 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MISSING_HOST_HEADER", "severitycode": 9, "fqdn": "/", "clientport": 50266, "vendorcode": "126", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "195.226.239.114", "serverIP": "176.204.106.13", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=176.204.106.13 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=195.226.239.114 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.226.239.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=176.204.106.13 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=195.226.239.114 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.226.239.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'barracuda_waf_MISSING_HOST_HEADER', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global', 'RuleType:GLOBAL', 'MISSING_HOST_HEADER'] productids: [0] sourceinfo: unknown localstarttime: 1675723400180 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MISSING_HOST_HEADER severitycode: 9 fqdn: / clientport: 50266 vendorcode: 126 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 195.226.239.114 serverIP: 176.204.106.13 userName: -
Explain this syslog message
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=111.187.232.116 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.209.112.167 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.209.112.167 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:35.216.166.62", "RuleID:global" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=111.187.232.116 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=141.209.112.167 spt=50350 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication=\"l9tcpid/v1.1.0\" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.209.112.167 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675723405418 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 50350, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "141.209.112.167", "serverIP": "111.187.232.116", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=111.187.232.116 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.209.112.167 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.209.112.167 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=111.187.232.116 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.209.112.167 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.209.112.167 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global'] productids: [0] sourceinfo: unknown localstarttime: 1675723405418 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 50350 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 141.209.112.167 serverIP: 111.187.232.116 userName: -
Explain this syslog message
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=50.10.212.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.197.40.126 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.197.40.126 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:35.216.166.62", "RuleID:global" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=50.10.212.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=57.197.40.126 spt=41748 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.197.40.126 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675723406464 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/server-status", "clientport": 41748, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "57.197.40.126", "serverIP": "50.10.212.135", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=50.10.212.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.197.40.126 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.197.40.126 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=50.10.212.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.197.40.126 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.197.40.126 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global'] productids: [0] sourceinfo: unknown localstarttime: 1675723406464 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /server-status clientport: 41748 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 57.197.40.126 serverIP: 50.10.212.135 userName: -
Explain this syslog message
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.211.156.249 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.222.40.231 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.222.40.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:35.216.166.62", "RuleID:global" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.211.156.249 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=241.222.40.231 spt=41750 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.222.40.231 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675723406940 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/config.json", "clientport": 41750, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "241.222.40.231", "serverIP": "107.211.156.249", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.211.156.249 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.222.40.231 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.222.40.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.211.156.249 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.222.40.231 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.222.40.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global'] productids: [0] sourceinfo: unknown localstarttime: 1675723406940 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /config.json clientport: 41750 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 241.222.40.231 serverIP: 107.211.156.249 userName: -
Explain this syslog message
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.86.203.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.225.211.46 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.225.211.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:35.216.166.62", "RuleID:global" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.86.203.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=180.225.211.46 spt=41748 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.225.211.46 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675723406464 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/server-status", "clientport": 41748, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "180.225.211.46", "serverIP": "36.86.203.219", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.86.203.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.225.211.46 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.225.211.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.86.203.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.225.211.46 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.225.211.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global'] productids: [0] sourceinfo: unknown localstarttime: 1675723406464 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /server-status clientport: 41748 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 180.225.211.46 serverIP: 36.86.203.219 userName: -
Explain this syslog message
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=27.118.233.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.46.98.33 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.46.98.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:35.216.166.62", "RuleID:global" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=27.118.233.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=252.46.98.33 spt=41750 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.46.98.33 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675723406940 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/config.json", "clientport": 41750, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "252.46.98.33", "serverIP": "27.118.233.175", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=27.118.233.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.46.98.33 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.46.98.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=27.118.233.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.46.98.33 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.46.98.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global'] productids: [0] sourceinfo: unknown localstarttime: 1675723406940 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /config.json clientport: 41750 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 252.46.98.33 serverIP: 27.118.233.175 userName: -
Explain this syslog message