input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=138.69.165.99 dst=148.227.163.233 protocol=tcp sport=60509 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 60509
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 138.69.165.99
serverIP: 148.227.163.233 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=28.137.4.35 dst=91.44.254.197 protocol=tcp sport=60509 dport=443 decision=blocked | {
"action": "block",
"clientport": 60509,
"message": "<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=28.137.4.35 dst=91.44.254.197 protocol=tcp sport=60509 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "28.137.4.35",
"serverIP": "91.44.254.197"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=28.137.4.35 dst=91.44.254.197 protocol=tcp sport=60509 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=28.137.4.35 dst=91.44.254.197 protocol=tcp sport=60509 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 60509
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 28.137.4.35
serverIP: 91.44.254.197 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=234.221.108.17 dst=70.204.228.207 protocol=tcp sport=60509 dport=443 decision=blocked | {
"action": "block",
"clientport": 60509,
"message": "<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=234.221.108.17 dst=70.204.228.207 protocol=tcp sport=60509 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "234.221.108.17",
"serverIP": "70.204.228.207"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=234.221.108.17 dst=70.204.228.207 protocol=tcp sport=60509 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=234.221.108.17 dst=70.204.228.207 protocol=tcp sport=60509 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 60509
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 234.221.108.17
serverIP: 70.204.228.207 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=110.254.124.15 dst=134.226.14.166 protocol=tcp sport=60509 dport=443 decision=blocked | {
"action": "block",
"clientport": 60509,
"message": "<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=110.254.124.15 dst=134.226.14.166 protocol=tcp sport=60509 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "110.254.124.15",
"serverIP": "134.226.14.166"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=110.254.124.15 dst=134.226.14.166 protocol=tcp sport=60509 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=110.254.124.15 dst=134.226.14.166 protocol=tcp sport=60509 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 60509
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 110.254.124.15
serverIP: 134.226.14.166 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=104.133.201.140 dst=100.53.97.184 protocol=tcp sport=64045 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=104.133.201.140 dst=100.53.97.184 protocol=tcp sport=64045 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64045,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "104.133.201.140",
"serverIP": "100.53.97.184"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=104.133.201.140 dst=100.53.97.184 protocol=tcp sport=64045 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=104.133.201.140 dst=100.53.97.184 protocol=tcp sport=64045 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64045
protocol: 6
streamName: meraki_l7_firewall
clientIP: 104.133.201.140
serverIP: 100.53.97.184 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=176.102.55.140 dst=92.224.93.248 protocol=tcp sport=64045 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=176.102.55.140 dst=92.224.93.248 protocol=tcp sport=64045 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64045,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "176.102.55.140",
"serverIP": "92.224.93.248"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=176.102.55.140 dst=92.224.93.248 protocol=tcp sport=64045 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=176.102.55.140 dst=92.224.93.248 protocol=tcp sport=64045 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64045
protocol: 6
streamName: meraki_l7_firewall
clientIP: 176.102.55.140
serverIP: 92.224.93.248 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=221.226.46.208 dst=161.228.75.161 protocol=tcp sport=64045 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=221.226.46.208 dst=161.228.75.161 protocol=tcp sport=64045 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64045,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "221.226.46.208",
"serverIP": "161.228.75.161"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=221.226.46.208 dst=161.228.75.161 protocol=tcp sport=64045 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=221.226.46.208 dst=161.228.75.161 protocol=tcp sport=64045 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64045
protocol: 6
streamName: meraki_l7_firewall
clientIP: 221.226.46.208
serverIP: 161.228.75.161 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=58.58.8.172 dst=42.6.48.192 protocol=tcp sport=64045 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=58.58.8.172 dst=42.6.48.192 protocol=tcp sport=64045 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64045,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "58.58.8.172",
"serverIP": "42.6.48.192"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=58.58.8.172 dst=42.6.48.192 protocol=tcp sport=64045 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660050678.344831573 NORDC_MX400_1 l7_firewall src=58.58.8.172 dst=42.6.48.192 protocol=tcp sport=64045 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64045
protocol: 6
streamName: meraki_l7_firewall
clientIP: 58.58.8.172
serverIP: 42.6.48.192 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=159.79.237.223 dst=89.242.89.244 protocol=tcp sport=80 dport=56378 decision=blocked | {
"action": "block",
"clientport": 56378,
"message": "<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=159.79.237.223 dst=89.242.89.244 protocol=tcp sport=80 dport=56378 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "89.242.89.244",
"serverIP": "159.79.237.223"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=159.79.237.223 dst=89.242.89.244 protocol=tcp sport=80 dport=56378 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=159.79.237.223 dst=89.242.89.244 protocol=tcp sport=80 dport=56378 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56378
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 89.242.89.244
serverIP: 159.79.237.223 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=119.22.227.175 dst=106.157.154.151 protocol=tcp sport=80 dport=56378 decision=blocked | {
"action": "block",
"clientport": 56378,
"message": "<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=119.22.227.175 dst=106.157.154.151 protocol=tcp sport=80 dport=56378 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "106.157.154.151",
"serverIP": "119.22.227.175"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=119.22.227.175 dst=106.157.154.151 protocol=tcp sport=80 dport=56378 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=119.22.227.175 dst=106.157.154.151 protocol=tcp sport=80 dport=56378 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56378
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 106.157.154.151
serverIP: 119.22.227.175 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=157.125.44.93 dst=107.228.138.191 protocol=tcp sport=80 dport=56378 decision=blocked | {
"action": "block",
"clientport": 56378,
"message": "<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=157.125.44.93 dst=107.228.138.191 protocol=tcp sport=80 dport=56378 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "107.228.138.191",
"serverIP": "157.125.44.93"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=157.125.44.93 dst=107.228.138.191 protocol=tcp sport=80 dport=56378 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=157.125.44.93 dst=107.228.138.191 protocol=tcp sport=80 dport=56378 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56378
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 107.228.138.191
serverIP: 157.125.44.93 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=62.208.249.247 dst=115.205.90.47 protocol=tcp sport=80 dport=56378 decision=blocked | {
"action": "block",
"clientport": 56378,
"message": "<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=62.208.249.247 dst=115.205.90.47 protocol=tcp sport=80 dport=56378 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "115.205.90.47",
"serverIP": "62.208.249.247"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=62.208.249.247 dst=115.205.90.47 protocol=tcp sport=80 dport=56378 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1684866575.473278766 NORDC_MX400_1 l7_firewall src=62.208.249.247 dst=115.205.90.47 protocol=tcp sport=80 dport=56378 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56378
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 115.205.90.47
serverIP: 62.208.249.247 | Explain this syslog message |
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=157.190.242.230 dst=154.21.249.98 protocol=tcp sport=57206 dport=443 decision=blocked | {
"action": "block",
"clientport": 57206,
"message": "<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=157.190.242.230 dst=154.21.249.98 protocol=tcp sport=57206 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "157.190.242.230",
"serverIP": "154.21.249.98"
} | Create a JSON artifact from the message |
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=157.190.242.230 dst=154.21.249.98 protocol=tcp sport=57206 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=157.190.242.230 dst=154.21.249.98 protocol=tcp sport=57206 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57206
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 157.190.242.230
serverIP: 154.21.249.98 | Explain this syslog message |
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=242.113.108.105 dst=73.35.85.56 protocol=tcp sport=57206 dport=443 decision=blocked | {
"action": "block",
"clientport": 57206,
"message": "<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=242.113.108.105 dst=73.35.85.56 protocol=tcp sport=57206 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "242.113.108.105",
"serverIP": "73.35.85.56"
} | Create a JSON artifact from the message |
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=242.113.108.105 dst=73.35.85.56 protocol=tcp sport=57206 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=242.113.108.105 dst=73.35.85.56 protocol=tcp sport=57206 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57206
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 242.113.108.105
serverIP: 73.35.85.56 | Explain this syslog message |
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=64.122.214.97 dst=155.4.19.146 protocol=tcp sport=57206 dport=443 decision=blocked | {
"action": "block",
"clientport": 57206,
"message": "<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=64.122.214.97 dst=155.4.19.146 protocol=tcp sport=57206 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "64.122.214.97",
"serverIP": "155.4.19.146"
} | Create a JSON artifact from the message |
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=64.122.214.97 dst=155.4.19.146 protocol=tcp sport=57206 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=64.122.214.97 dst=155.4.19.146 protocol=tcp sport=57206 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57206
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 64.122.214.97
serverIP: 155.4.19.146 | Explain this syslog message |
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=17.198.182.2 dst=172.130.187.138 protocol=tcp sport=57206 dport=443 decision=blocked | {
"action": "block",
"clientport": 57206,
"message": "<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=17.198.182.2 dst=172.130.187.138 protocol=tcp sport=57206 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "17.198.182.2",
"serverIP": "172.130.187.138"
} | Create a JSON artifact from the message |
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=17.198.182.2 dst=172.130.187.138 protocol=tcp sport=57206 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=71.25.173.65 1 1690554516.994696663 M31_MX67C_PV_MMI l7_firewall src=17.198.182.2 dst=172.130.187.138 protocol=tcp sport=57206 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57206
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 17.198.182.2
serverIP: 172.130.187.138 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=99.98.97.46 dst=1.128.85.230 protocol=icmp type=0 decision=blocked | {
"action": "block",
"message": "<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=99.98.97.46 dst=1.128.85.230 protocol=icmp type=0 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 1,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "99.98.97.46",
"serverIP": "1.128.85.230"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=99.98.97.46 dst=1.128.85.230 protocol=icmp type=0 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=99.98.97.46 dst=1.128.85.230 protocol=icmp type=0 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
messagetype: anomalous_behavior
program: l7_firewall
protocol: 1
senderhost: 192.168.2.250
sensitivity: normal
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 99.98.97.46
serverIP: 1.128.85.230 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=64.24.51.227 dst=75.221.130.228 protocol=icmp type=0 decision=blocked | {
"action": "block",
"message": "<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=64.24.51.227 dst=75.221.130.228 protocol=icmp type=0 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 1,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "64.24.51.227",
"serverIP": "75.221.130.228"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=64.24.51.227 dst=75.221.130.228 protocol=icmp type=0 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=64.24.51.227 dst=75.221.130.228 protocol=icmp type=0 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
messagetype: anomalous_behavior
program: l7_firewall
protocol: 1
senderhost: 192.168.2.250
sensitivity: normal
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 64.24.51.227
serverIP: 75.221.130.228 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=7.29.58.161 dst=182.15.213.200 protocol=icmp type=0 decision=blocked | {
"action": "block",
"message": "<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=7.29.58.161 dst=182.15.213.200 protocol=icmp type=0 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 1,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "7.29.58.161",
"serverIP": "182.15.213.200"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=7.29.58.161 dst=182.15.213.200 protocol=icmp type=0 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=7.29.58.161 dst=182.15.213.200 protocol=icmp type=0 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
messagetype: anomalous_behavior
program: l7_firewall
protocol: 1
senderhost: 192.168.2.250
sensitivity: normal
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 7.29.58.161
serverIP: 182.15.213.200 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=159.229.133.171 dst=79.240.56.98 protocol=icmp type=0 decision=blocked | {
"action": "block",
"message": "<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=159.229.133.171 dst=79.240.56.98 protocol=icmp type=0 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 1,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "159.229.133.171",
"serverIP": "79.240.56.98"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=159.229.133.171 dst=79.240.56.98 protocol=icmp type=0 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1687495563.665787372 NORDC_MX400_1 l7_firewall src=159.229.133.171 dst=79.240.56.98 protocol=icmp type=0 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
messagetype: anomalous_behavior
program: l7_firewall
protocol: 1
senderhost: 192.168.2.250
sensitivity: normal
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 159.229.133.171
serverIP: 79.240.56.98 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=153.248.32.151 dst=186.42.189.141 protocol=tcp sport=59880 dport=443 decision=blocked | {
"action": "block",
"clientport": 59880,
"message": "<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=153.248.32.151 dst=186.42.189.141 protocol=tcp sport=59880 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "153.248.32.151",
"serverIP": "186.42.189.141"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=153.248.32.151 dst=186.42.189.141 protocol=tcp sport=59880 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=153.248.32.151 dst=186.42.189.141 protocol=tcp sport=59880 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59880
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 153.248.32.151
serverIP: 186.42.189.141 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=155.38.54.41 dst=113.144.107.130 protocol=tcp sport=59880 dport=443 decision=blocked | {
"action": "block",
"clientport": 59880,
"message": "<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=155.38.54.41 dst=113.144.107.130 protocol=tcp sport=59880 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "155.38.54.41",
"serverIP": "113.144.107.130"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=155.38.54.41 dst=113.144.107.130 protocol=tcp sport=59880 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=155.38.54.41 dst=113.144.107.130 protocol=tcp sport=59880 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59880
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 155.38.54.41
serverIP: 113.144.107.130 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=116.44.57.41 dst=182.165.115.128 protocol=tcp sport=59880 dport=443 decision=blocked | {
"action": "block",
"clientport": 59880,
"message": "<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=116.44.57.41 dst=182.165.115.128 protocol=tcp sport=59880 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "116.44.57.41",
"serverIP": "182.165.115.128"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=116.44.57.41 dst=182.165.115.128 protocol=tcp sport=59880 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=116.44.57.41 dst=182.165.115.128 protocol=tcp sport=59880 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59880
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 116.44.57.41
serverIP: 182.165.115.128 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=194.176.113.50 dst=94.70.44.8 protocol=tcp sport=59880 dport=443 decision=blocked | {
"action": "block",
"clientport": 59880,
"message": "<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=194.176.113.50 dst=94.70.44.8 protocol=tcp sport=59880 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "194.176.113.50",
"serverIP": "94.70.44.8"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=194.176.113.50 dst=94.70.44.8 protocol=tcp sport=59880 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688198378.849744371 NORDC_MX400_1 l7_firewall src=194.176.113.50 dst=94.70.44.8 protocol=tcp sport=59880 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59880
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 194.176.113.50
serverIP: 94.70.44.8 | Explain this syslog message |
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=163.204.223.15 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=145.60.117.2 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=145.60.117.2 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"barracuda_waf_MISSING_HOST_HEADER",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global",
"RuleType:GLOBAL",
"MISSING_HOST_HEADER"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=163.204.223.15 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser=\"-\" src=145.60.117.2 spt=50266 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=145.60.117.2 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723400180 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MISSING_HOST_HEADER",
"severitycode": 9,
"fqdn": "/",
"clientport": 50266,
"vendorcode": "126",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "145.60.117.2",
"serverIP": "163.204.223.15",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=163.204.223.15 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=145.60.117.2 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=145.60.117.2 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=163.204.223.15 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=145.60.117.2 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=145.60.117.2 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'barracuda_waf_MISSING_HOST_HEADER', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global', 'RuleType:GLOBAL', 'MISSING_HOST_HEADER']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723400180
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MISSING_HOST_HEADER
severitycode: 9
fqdn: /
clientport: 50266
vendorcode: 126
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 145.60.117.2
serverIP: 163.204.223.15
userName: - | Explain this syslog message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=221.104.107.237 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.110.45.144 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.110.45.144 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=221.104.107.237 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=97.110.45.144 spt=50350 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication=\"l9tcpid/v1.1.0\" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.110.45.144 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723405418 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 50350,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "97.110.45.144",
"serverIP": "221.104.107.237",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=221.104.107.237 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.110.45.144 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.110.45.144 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=221.104.107.237 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.110.45.144 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.110.45.144 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723405418
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 50350
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 97.110.45.144
serverIP: 221.104.107.237
userName: - | Explain this syslog message |
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=210.150.105.200 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=218.72.228.133 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=218.72.228.133 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"barracuda_waf_MISSING_HOST_HEADER",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global",
"RuleType:GLOBAL",
"MISSING_HOST_HEADER"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=210.150.105.200 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser=\"-\" src=218.72.228.133 spt=50266 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=218.72.228.133 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723400180 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MISSING_HOST_HEADER",
"severitycode": 9,
"fqdn": "/",
"clientport": 50266,
"vendorcode": "126",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "218.72.228.133",
"serverIP": "210.150.105.200",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=210.150.105.200 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=218.72.228.133 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=218.72.228.133 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=210.150.105.200 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=218.72.228.133 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=218.72.228.133 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'barracuda_waf_MISSING_HOST_HEADER', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global', 'RuleType:GLOBAL', 'MISSING_HOST_HEADER']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723400180
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MISSING_HOST_HEADER
severitycode: 9
fqdn: /
clientport: 50266
vendorcode: 126
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 218.72.228.133
serverIP: 210.150.105.200
userName: - | Explain this syslog message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=108.28.7.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=217.53.39.63 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=217.53.39.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=108.28.7.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=217.53.39.63 spt=50350 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication=\"l9tcpid/v1.1.0\" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=217.53.39.63 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723405418 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 50350,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "217.53.39.63",
"serverIP": "108.28.7.236",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=108.28.7.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=217.53.39.63 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=217.53.39.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=108.28.7.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=217.53.39.63 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=217.53.39.63 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723405418
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 50350
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 217.53.39.63
serverIP: 108.28.7.236
userName: - | Explain this syslog message |
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=176.204.106.13 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=195.226.239.114 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.226.239.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"barracuda_waf_MISSING_HOST_HEADER",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global",
"RuleType:GLOBAL",
"MISSING_HOST_HEADER"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=176.204.106.13 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser=\"-\" src=195.226.239.114 spt=50266 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.226.239.114 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723400180 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MISSING_HOST_HEADER",
"severitycode": 9,
"fqdn": "/",
"clientport": 50266,
"vendorcode": "126",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "195.226.239.114",
"serverIP": "176.204.106.13",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=176.204.106.13 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=195.226.239.114 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.226.239.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:20 WAFirewall CEF:0|Barracuda|WAF|1200|126|MISSING_HOST_HEADER|1|cat=WF dst=176.204.106.13 dpt=443 act=DENY msg=[GET / HTTP/1.1] duser="-" src=195.226.239.114 spt=50266 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:20 rt=1675723400180 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18628e5e3f4-66d3642e cn2=50266 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.226.239.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'barracuda_waf_MISSING_HOST_HEADER', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global', 'RuleType:GLOBAL', 'MISSING_HOST_HEADER']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723400180
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MISSING_HOST_HEADER
severitycode: 9
fqdn: /
clientport: 50266
vendorcode: 126
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 195.226.239.114
serverIP: 176.204.106.13
userName: - | Explain this syslog message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=111.187.232.116 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.209.112.167 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.209.112.167 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=111.187.232.116 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=141.209.112.167 spt=50350 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication=\"l9tcpid/v1.1.0\" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.209.112.167 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723405418 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 50350,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "141.209.112.167",
"serverIP": "111.187.232.116",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=111.187.232.116 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.209.112.167 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.209.112.167 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=111.187.232.116 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.209.112.167 spt=50350 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405418 request=/ requestClientApplication="l9tcpid/v1.1.0" dvchost=WAFirewall externalId=18628e5f86a-66d36827 cn2=50350 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.209.112.167 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723405418
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 50350
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 141.209.112.167
serverIP: 111.187.232.116
userName: - | Explain this syslog message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=50.10.212.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.197.40.126 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.197.40.126 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=50.10.212.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=57.197.40.126 spt=41748 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.197.40.126 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723406464 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/server-status",
"clientport": 41748,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "57.197.40.126",
"serverIP": "50.10.212.135",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=50.10.212.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.197.40.126 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.197.40.126 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=50.10.212.135 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.197.40.126 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.197.40.126 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723406464
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /server-status
clientport: 41748
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 57.197.40.126
serverIP: 50.10.212.135
userName: - | Explain this syslog message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.211.156.249 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.222.40.231 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.222.40.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.211.156.249 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=241.222.40.231 spt=41750 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.222.40.231 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723406940 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/config.json",
"clientport": 41750,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "241.222.40.231",
"serverIP": "107.211.156.249",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.211.156.249 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.222.40.231 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.222.40.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.211.156.249 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.222.40.231 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.222.40.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723406940
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /config.json
clientport: 41750
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 241.222.40.231
serverIP: 107.211.156.249
userName: - | Explain this syslog message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.86.203.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.225.211.46 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.225.211.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.86.203.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=180.225.211.46 spt=41748 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.225.211.46 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723406464 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/server-status",
"clientport": 41748,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "180.225.211.46",
"serverIP": "36.86.203.219",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.86.203.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.225.211.46 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.225.211.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.86.203.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.225.211.46 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.225.211.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723406464
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /server-status
clientport: 41748
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 180.225.211.46
serverIP: 36.86.203.219
userName: - | Explain this syslog message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=27.118.233.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.46.98.33 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.46.98.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=27.118.233.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=252.46.98.33 spt=41750 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.46.98.33 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723406940 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/config.json",
"clientport": 41750,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "252.46.98.33",
"serverIP": "27.118.233.175",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=27.118.233.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.46.98.33 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.46.98.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=27.118.233.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.46.98.33 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.46.98.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723406940
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /config.json
clientport: 41750
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 252.46.98.33
serverIP: 27.118.233.175
userName: - | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.