input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=221.175.92.156 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.228.36.57 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.228.36.57 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=221.175.92.156 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=233.228.36.57 spt=41748 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.228.36.57 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723406464 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/server-status",
"clientport": 41748,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "233.228.36.57",
"serverIP": "221.175.92.156",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=221.175.92.156 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.228.36.57 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.228.36.57 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=221.175.92.156 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.228.36.57 spt=41748 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406464 request=/server-status requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fc7f-49bf8be3 cn2=41748 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.228.36.57 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723406464
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /server-status
clientport: 41748
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 233.228.36.57
serverIP: 221.175.92.156
userName: - | Explain this syslog message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=199.102.202.58 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=150.168.237.97 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.168.237.97 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=199.102.202.58 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=150.168.237.97 spt=41750 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.168.237.97 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723406940 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/config.json",
"clientport": 41750,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "150.168.237.97",
"serverIP": "199.102.202.58",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=199.102.202.58 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=150.168.237.97 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.168.237.97 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=199.102.202.58 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=150.168.237.97 spt=41750 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:26 rt=1675723406940 request=/config.json requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5fe5c-4ac69520 cn2=41750 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.168.237.97 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723406940
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /config.json
clientport: 41750
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 150.168.237.97
serverIP: 199.102.202.58
userName: - | Explain this syslog message |
<185>Feb 6 16:43:27 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=100.2.79.30 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=199.32.236.148 spt=41762 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:27 rt=1675723407689 request=/telescope/requests requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e60149-4bcba551 cn2=41762 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=199.32.236.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:27 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=100.2.79.30 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=199.32.236.148 spt=41762 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:27 rt=1675723407689 request=/telescope/requests requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e60149-4bcba551 cn2=41762 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=199.32.236.148 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723407689 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/telescope/requests",
"clientport": 41762,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "199.32.236.148",
"serverIP": "100.2.79.30",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:27 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=100.2.79.30 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=199.32.236.148 spt=41762 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:27 rt=1675723407689 request=/telescope/requests requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e60149-4bcba551 cn2=41762 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=199.32.236.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:27 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=100.2.79.30 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=199.32.236.148 spt=41762 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:27 rt=1675723407689 request=/telescope/requests requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e60149-4bcba551 cn2=41762 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=199.32.236.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723407689
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /telescope/requests
clientport: 41762
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 199.32.236.148
serverIP: 100.2.79.30
userName: - | Explain this syslog message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=116.27.30.42 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=231.118.111.139 spt=41738 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405992 request=/.git/config requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5faa8-40c43810 cn2=41738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.118.111.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=116.27.30.42 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=231.118.111.139 spt=41738 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:25 rt=1675723405992 request=/.git/config requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e5faa8-40c43810 cn2=41738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.118.111.139 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723405992 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/.git/config",
"clientport": 41738,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "231.118.111.139",
"serverIP": "116.27.30.42",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=116.27.30.42 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=231.118.111.139 spt=41738 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405992 request=/.git/config requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5faa8-40c43810 cn2=41738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.118.111.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=116.27.30.42 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=231.118.111.139 spt=41738 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405992 request=/.git/config requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5faa8-40c43810 cn2=41738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.118.111.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723405992
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /.git/config
clientport: 41738
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 231.118.111.139
serverIP: 116.27.30.42
userName: - | Explain this syslog message |
<185>Feb 6 16:43:27 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=0.154.159.125 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=211.217.64.198 spt=41762 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:27 rt=1675723407689 request=/telescope/requests requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e60149-4bcba551 cn2=41762 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.217.64.198 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:27 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=0.154.159.125 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=211.217.64.198 spt=41762 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:27 rt=1675723407689 request=/telescope/requests requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e60149-4bcba551 cn2=41762 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.217.64.198 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723407689 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/telescope/requests",
"clientport": 41762,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "211.217.64.198",
"serverIP": "0.154.159.125",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:27 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=0.154.159.125 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=211.217.64.198 spt=41762 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:27 rt=1675723407689 request=/telescope/requests requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e60149-4bcba551 cn2=41762 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.217.64.198 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:27 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=0.154.159.125 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=211.217.64.198 spt=41762 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:27 rt=1675723407689 request=/telescope/requests requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e60149-4bcba551 cn2=41762 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.217.64.198 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723407689
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /telescope/requests
clientport: 41762
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 211.217.64.198
serverIP: 0.154.159.125
userName: - | Explain this syslog message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.50.2.157 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=146.49.152.177 spt=41738 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405992 request=/.git/config requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5faa8-40c43810 cn2=41738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=146.49.152.177 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.50.2.157 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=146.49.152.177 spt=41738 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:25 rt=1675723405992 request=/.git/config requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e5faa8-40c43810 cn2=41738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=146.49.152.177 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723405992 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/.git/config",
"clientport": 41738,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "146.49.152.177",
"serverIP": "104.50.2.157",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.50.2.157 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=146.49.152.177 spt=41738 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405992 request=/.git/config requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5faa8-40c43810 cn2=41738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=146.49.152.177 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.50.2.157 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=146.49.152.177 spt=41738 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405992 request=/.git/config requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5faa8-40c43810 cn2=41738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=146.49.152.177 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723405992
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /.git/config
clientport: 41738
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 146.49.152.177
serverIP: 104.50.2.157
userName: - | Explain this syslog message |
<185>Feb 6 16:43:27 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=39.253.97.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.204.212.157 spt=41762 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:27 rt=1675723407689 request=/telescope/requests requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e60149-4bcba551 cn2=41762 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.204.212.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:27 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=39.253.97.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=239.204.212.157 spt=41762 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:27 rt=1675723407689 request=/telescope/requests requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e60149-4bcba551 cn2=41762 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.204.212.157 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723407689 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/telescope/requests",
"clientport": 41762,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "239.204.212.157",
"serverIP": "39.253.97.219",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:27 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=39.253.97.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.204.212.157 spt=41762 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:27 rt=1675723407689 request=/telescope/requests requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e60149-4bcba551 cn2=41762 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.204.212.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:27 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=39.253.97.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.204.212.157 spt=41762 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:27 rt=1675723407689 request=/telescope/requests requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e60149-4bcba551 cn2=41762 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.204.212.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723407689
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /telescope/requests
clientport: 41762
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 239.204.212.157
serverIP: 39.253.97.219
userName: - | Explain this syslog message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=99.176.164.196 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=175.9.32.94 spt=41738 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405992 request=/.git/config requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5faa8-40c43810 cn2=41738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=175.9.32.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:35.216.166.62",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=99.176.164.196 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=175.9.32.94 spt=41738 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:43:25 rt=1675723405992 request=/.git/config requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr\" dvchost=WAFirewall externalId=18628e5faa8-40c43810 cn2=41738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=175.9.32.94 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723405992 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/.git/config",
"clientport": 41738,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "175.9.32.94",
"serverIP": "99.176.164.196",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=99.176.164.196 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=175.9.32.94 spt=41738 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405992 request=/.git/config requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5faa8-40c43810 cn2=41738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=175.9.32.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:43:25 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=99.176.164.196 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=175.9.32.94 spt=41738 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:43:25 rt=1675723405992 request=/.git/config requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:103.0) Gecko/20100101 Firefox/103.0 abuse.xmco.fr" dvchost=WAFirewall externalId=18628e5faa8-40c43810 cn2=41738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=175.9.32.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:35.216.166.62', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723405992
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /.git/config
clientport: 41738
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 175.9.32.94
serverIP: 99.176.164.196
userName: - | Explain this syslog message |
<185>Feb 6 16:50:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=117.243.154.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.201.122.12 spt=38794 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:50:24 rt=1675723824351 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18628ec5cdf-7805455a cn2=38794 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.201.122.12 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:50:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=117.243.154.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=166.201.122.12 spt=38794 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:50:24 rt=1675723824351 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18628ec5cdf-7805455a cn2=38794 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.201.122.12 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723824351 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 38794,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "166.201.122.12",
"serverIP": "117.243.154.21",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:50:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=117.243.154.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.201.122.12 spt=38794 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:50:24 rt=1675723824351 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18628ec5cdf-7805455a cn2=38794 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.201.122.12 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:50:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=117.243.154.21 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.201.122.12 spt=38794 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:50:24 rt=1675723824351 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18628ec5cdf-7805455a cn2=38794 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.201.122.12 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723824351
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 38794
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 166.201.122.12
serverIP: 117.243.154.21
userName: - | Explain this syslog message |
<185>Feb 6 16:50:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=119.66.217.1 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=195.202.18.156 spt=38794 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:50:24 rt=1675723824351 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18628ec5cdf-7805455a cn2=38794 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=195.202.18.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:50:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=119.66.217.1 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=195.202.18.156 spt=38794 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:50:24 rt=1675723824351 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18628ec5cdf-7805455a cn2=38794 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=195.202.18.156 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723824351 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 38794,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "195.202.18.156",
"serverIP": "119.66.217.1",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:50:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=119.66.217.1 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=195.202.18.156 spt=38794 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:50:24 rt=1675723824351 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18628ec5cdf-7805455a cn2=38794 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=195.202.18.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:50:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=119.66.217.1 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=195.202.18.156 spt=38794 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:50:24 rt=1675723824351 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18628ec5cdf-7805455a cn2=38794 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=195.202.18.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723824351
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 38794
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 195.202.18.156
serverIP: 119.66.217.1
userName: - | Explain this syslog message |
<185>Feb 6 16:50:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.167.59.60 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=69.219.134.3 spt=38794 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:50:24 rt=1675723824351 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18628ec5cdf-7805455a cn2=38794 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.219.134.3 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 16:50:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.167.59.60 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=69.219.134.3 spt=38794 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 16:50:24 rt=1675723824351 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18628ec5cdf-7805455a cn2=38794 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.219.134.3 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675723824351 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 38794,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "69.219.134.3",
"serverIP": "36.167.59.60",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 16:50:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.167.59.60 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=69.219.134.3 spt=38794 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:50:24 rt=1675723824351 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18628ec5cdf-7805455a cn2=38794 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.219.134.3 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 16:50:24 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.167.59.60 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=69.219.134.3 spt=38794 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 16:50:24 rt=1675723824351 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18628ec5cdf-7805455a cn2=38794 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.219.134.3 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1675723824351
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 38794
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 69.219.134.3
serverIP: 36.167.59.60
userName: - | Explain this syslog message |
<185>Jan 2 15:08:38 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=108.229.242.218 dpt=80 act=DENY msg=[] duser="-" src=100.22.163.50 spt=35588 requestMethod="-" app=HTTP requestContext="-" start=Jan 02 2024 15:08:38 rt=1704229718085 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ccc01c844-d504379e cn2=35588 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=100.22.163.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 35588,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1704229718085 ",
"message": "<185>Jan 2 15:08:38 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=108.229.242.218 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=100.22.163.50 spt=35588 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jan 02 2024 15:08:38 rt=1704229718085 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18ccc01c844-d504379e cn2=35588 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=100.22.163.50 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"RuleType:GLOBAL",
"ProxyIP:198.244.213.98",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "100.22.163.50",
"serverIP": "108.229.242.218",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 2 15:08:38 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=108.229.242.218 dpt=80 act=DENY msg=[] duser="-" src=100.22.163.50 spt=35588 requestMethod="-" app=HTTP requestContext="-" start=Jan 02 2024 15:08:38 rt=1704229718085 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ccc01c844-d504379e cn2=35588 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=100.22.163.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 2 15:08:38 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=108.229.242.218 dpt=80 act=DENY msg=[] duser="-" src=100.22.163.50 spt=35588 requestMethod="-" app=HTTP requestContext="-" start=Jan 02 2024 15:08:38 rt=1704229718085 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18ccc01c844-d504379e cn2=35588 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=100.22.163.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35588
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1704229718085
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'RuleType:GLOBAL', 'ProxyIP:198.244.213.98', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 100.22.163.50
serverIP: 108.229.242.218
userName: - | Explain this syslog message |
<185>Jan 2 14:50:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.231.12.118 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=187.164.24.97 spt=41634 requestMethod=GET app=HTTP requestContext="-" start=Jan 02 2024 14:50:29 rt=1704228629704 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18ccbf12ca8-d7c3cf47 cn2=41634 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=187.164.24.97 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41634,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1704228629704 ",
"message": "<185>Jan 2 14:50:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.231.12.118 dpt=80 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=187.164.24.97 spt=41634 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 02 2024 14:50:29 rt=1704228629704 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18ccbf12ca8-d7c3cf47 cn2=41634 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=187.164.24.97 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:94.102.61.10",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "187.164.24.97",
"serverIP": "40.231.12.118",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 2 14:50:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.231.12.118 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=187.164.24.97 spt=41634 requestMethod=GET app=HTTP requestContext="-" start=Jan 02 2024 14:50:29 rt=1704228629704 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18ccbf12ca8-d7c3cf47 cn2=41634 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=187.164.24.97 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 2 14:50:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.231.12.118 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=187.164.24.97 spt=41634 requestMethod=GET app=HTTP requestContext="-" start=Jan 02 2024 14:50:29 rt=1704228629704 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18ccbf12ca8-d7c3cf47 cn2=41634 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=187.164.24.97 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41634
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1704228629704
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:94.102.61.10', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 187.164.24.97
serverIP: 40.231.12.118
userName: - | Explain this syslog message |
<185>Jan 2 14:50:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.201.243.0 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=158.73.199.188 spt=41634 requestMethod=GET app=HTTP requestContext="-" start=Jan 02 2024 14:50:29 rt=1704228629704 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18ccbf12ca8-d7c3cf47 cn2=41634 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.73.199.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41634,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1704228629704 ",
"message": "<185>Jan 2 14:50:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.201.243.0 dpt=80 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=158.73.199.188 spt=41634 requestMethod=GET app=HTTP requestContext=\"-\" start=Jan 02 2024 14:50:29 rt=1704228629704 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18ccbf12ca8-d7c3cf47 cn2=41634 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.73.199.188 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:94.102.61.10",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "158.73.199.188",
"serverIP": "15.201.243.0",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 2 14:50:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.201.243.0 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=158.73.199.188 spt=41634 requestMethod=GET app=HTTP requestContext="-" start=Jan 02 2024 14:50:29 rt=1704228629704 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18ccbf12ca8-d7c3cf47 cn2=41634 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.73.199.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 2 14:50:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.201.243.0 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=158.73.199.188 spt=41634 requestMethod=GET app=HTTP requestContext="-" start=Jan 02 2024 14:50:29 rt=1704228629704 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18ccbf12ca8-d7c3cf47 cn2=41634 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.73.199.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41634
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1704228629704
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:94.102.61.10', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 158.73.199.188
serverIP: 15.201.243.0
userName: - | Explain this syslog message |
<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=231.203.48.36 dst=74.112.156.98 protocol=udp sport=29427 dport=32100 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 29427,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=231.203.48.36 dst=74.112.156.98 protocol=udp sport=29427 dport=32100 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 32100,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "74.112.156.98",
"serverIP": "231.203.48.36"
} | Create a JSON artifact from the message |
<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=231.203.48.36 dst=74.112.156.98 protocol=udp sport=29427 dport=32100 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=231.203.48.36 dst=74.112.156.98 protocol=udp sport=29427 dport=32100 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 29427
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 32100
protocol: 17
streamName: meraki_l7_firewall
clientIP: 74.112.156.98
serverIP: 231.203.48.36 | Explain this syslog message |
<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=105.156.209.91 dst=75.48.242.123 protocol=udp sport=29427 dport=32100 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 29427,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=105.156.209.91 dst=75.48.242.123 protocol=udp sport=29427 dport=32100 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 32100,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "75.48.242.123",
"serverIP": "105.156.209.91"
} | Create a JSON artifact from the message |
<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=105.156.209.91 dst=75.48.242.123 protocol=udp sport=29427 dport=32100 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=105.156.209.91 dst=75.48.242.123 protocol=udp sport=29427 dport=32100 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 29427
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 32100
protocol: 17
streamName: meraki_l7_firewall
clientIP: 75.48.242.123
serverIP: 105.156.209.91 | Explain this syslog message |
<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=210.5.190.146 dst=187.55.56.106 protocol=udp sport=29427 dport=32100 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 29427,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=210.5.190.146 dst=187.55.56.106 protocol=udp sport=29427 dport=32100 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 32100,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "187.55.56.106",
"serverIP": "210.5.190.146"
} | Create a JSON artifact from the message |
<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=210.5.190.146 dst=187.55.56.106 protocol=udp sport=29427 dport=32100 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=210.5.190.146 dst=187.55.56.106 protocol=udp sport=29427 dport=32100 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 29427
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 32100
protocol: 17
streamName: meraki_l7_firewall
clientIP: 187.55.56.106
serverIP: 210.5.190.146 | Explain this syslog message |
<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=172.190.13.112 dst=42.120.78.119 protocol=udp sport=29427 dport=32100 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 29427,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=172.190.13.112 dst=42.120.78.119 protocol=udp sport=29427 dport=32100 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 32100,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "42.120.78.119",
"serverIP": "172.190.13.112"
} | Create a JSON artifact from the message |
<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=172.190.13.112 dst=42.120.78.119 protocol=udp sport=29427 dport=32100 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.86.241.61 1 1656367138.176320857 H171_MX67C_HoldenPTC l7_firewall src=172.190.13.112 dst=42.120.78.119 protocol=udp sport=29427 dport=32100 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 29427
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 32100
protocol: 17
streamName: meraki_l7_firewall
clientIP: 42.120.78.119
serverIP: 172.190.13.112 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=74.250.190.212 dst=112.255.34.146 protocol=tcp sport=57940 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=74.250.190.212 dst=112.255.34.146 protocol=tcp sport=57940 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57940,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "74.250.190.212",
"serverIP": "112.255.34.146"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=74.250.190.212 dst=112.255.34.146 protocol=tcp sport=57940 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=74.250.190.212 dst=112.255.34.146 protocol=tcp sport=57940 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57940
protocol: 6
streamName: meraki_l7_firewall
clientIP: 74.250.190.212
serverIP: 112.255.34.146 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=214.154.66.215 dst=155.137.164.129 protocol=tcp sport=57940 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=214.154.66.215 dst=155.137.164.129 protocol=tcp sport=57940 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57940,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "214.154.66.215",
"serverIP": "155.137.164.129"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=214.154.66.215 dst=155.137.164.129 protocol=tcp sport=57940 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=214.154.66.215 dst=155.137.164.129 protocol=tcp sport=57940 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57940
protocol: 6
streamName: meraki_l7_firewall
clientIP: 214.154.66.215
serverIP: 155.137.164.129 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=109.3.0.38 dst=49.189.170.251 protocol=tcp sport=57940 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=109.3.0.38 dst=49.189.170.251 protocol=tcp sport=57940 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57940,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "109.3.0.38",
"serverIP": "49.189.170.251"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=109.3.0.38 dst=49.189.170.251 protocol=tcp sport=57940 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=109.3.0.38 dst=49.189.170.251 protocol=tcp sport=57940 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57940
protocol: 6
streamName: meraki_l7_firewall
clientIP: 109.3.0.38
serverIP: 49.189.170.251 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=90.231.126.132 dst=153.179.104.218 protocol=tcp sport=57940 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=90.231.126.132 dst=153.179.104.218 protocol=tcp sport=57940 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57940,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "90.231.126.132",
"serverIP": "153.179.104.218"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=90.231.126.132 dst=153.179.104.218 protocol=tcp sport=57940 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656492194.735318852 NORDC_MX400_1 l7_firewall src=90.231.126.132 dst=153.179.104.218 protocol=tcp sport=57940 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57940
protocol: 6
streamName: meraki_l7_firewall
clientIP: 90.231.126.132
serverIP: 153.179.104.218 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=144.18.199.72 dst=8.203.72.183 protocol=udp sport=49135 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=144.18.199.72 dst=8.203.72.183 protocol=udp sport=49135 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49135,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "144.18.199.72",
"serverIP": "8.203.72.183"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=144.18.199.72 dst=8.203.72.183 protocol=udp sport=49135 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=144.18.199.72 dst=8.203.72.183 protocol=udp sport=49135 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49135
protocol: 17
streamName: meraki_l7_firewall
clientIP: 144.18.199.72
serverIP: 8.203.72.183 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=226.165.50.45 dst=180.184.174.160 protocol=udp sport=49135 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=226.165.50.45 dst=180.184.174.160 protocol=udp sport=49135 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49135,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "226.165.50.45",
"serverIP": "180.184.174.160"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=226.165.50.45 dst=180.184.174.160 protocol=udp sport=49135 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=226.165.50.45 dst=180.184.174.160 protocol=udp sport=49135 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49135
protocol: 17
streamName: meraki_l7_firewall
clientIP: 226.165.50.45
serverIP: 180.184.174.160 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=215.226.45.91 dst=89.91.92.238 protocol=udp sport=49135 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=215.226.45.91 dst=89.91.92.238 protocol=udp sport=49135 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49135,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "215.226.45.91",
"serverIP": "89.91.92.238"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=215.226.45.91 dst=89.91.92.238 protocol=udp sport=49135 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=215.226.45.91 dst=89.91.92.238 protocol=udp sport=49135 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49135
protocol: 17
streamName: meraki_l7_firewall
clientIP: 215.226.45.91
serverIP: 89.91.92.238 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=91.130.178.81 dst=41.120.177.96 protocol=udp sport=49135 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=91.130.178.81 dst=41.120.177.96 protocol=udp sport=49135 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49135,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "91.130.178.81",
"serverIP": "41.120.177.96"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=91.130.178.81 dst=41.120.177.96 protocol=udp sport=49135 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1677914605.532970959 NORDC_MX400_1 l7_firewall src=91.130.178.81 dst=41.120.177.96 protocol=udp sport=49135 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49135
protocol: 17
streamName: meraki_l7_firewall
clientIP: 91.130.178.81
serverIP: 41.120.177.96 | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"179.51.74.65","externalIp":"208.166.155.26","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=179.51.74.65 ::: serverIP=208.166.155.26 ::: userName=janedoe ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-11T15:49:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"179.51.74.65\",\"externalIp\":\"208.166.155.26\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=179.51.74.65 ::: serverIP=208.166.155.26 ::: userName=janedoe ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "179.51.74.65",
"serverIP": "208.166.155.26",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"179.51.74.65","externalIp":"208.166.155.26","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=179.51.74.65 ::: serverIP=208.166.155.26 ::: userName=janedoe ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"179.51.74.65","externalIp":"208.166.155.26","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=179.51.74.65 ::: serverIP=208.166.155.26 ::: userName=janedoe ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-11T15:49:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 179.51.74.65
serverIP: 208.166.155.26
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"238.184.74.1","externalIp":"189.251.52.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=238.184.74.1 ::: serverIP=189.251.52.145 ::: userName=bob ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-11T15:49:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"238.184.74.1\",\"externalIp\":\"189.251.52.145\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=238.184.74.1 ::: serverIP=189.251.52.145 ::: userName=bob ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "238.184.74.1",
"serverIP": "189.251.52.145",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"238.184.74.1","externalIp":"189.251.52.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=238.184.74.1 ::: serverIP=189.251.52.145 ::: userName=bob ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"238.184.74.1","externalIp":"189.251.52.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=238.184.74.1 ::: serverIP=189.251.52.145 ::: userName=bob ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-11T15:49:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 238.184.74.1
serverIP: 189.251.52.145
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"63.104.73.40","externalIp":"253.111.137.193","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=63.104.73.40 ::: serverIP=253.111.137.193 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-11T15:49:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"63.104.73.40\",\"externalIp\":\"253.111.137.193\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=63.104.73.40 ::: serverIP=253.111.137.193 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "63.104.73.40",
"serverIP": "253.111.137.193",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"63.104.73.40","externalIp":"253.111.137.193","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=63.104.73.40 ::: serverIP=253.111.137.193 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"63.104.73.40","externalIp":"253.111.137.193","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=63.104.73.40 ::: serverIP=253.111.137.193 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-11T15:49:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 63.104.73.40
serverIP: 253.111.137.193
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"206.90.177.99","externalIp":"40.220.6.68","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=206.90.177.99 ::: serverIP=40.220.6.68 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-11T15:49:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"206.90.177.99\",\"externalIp\":\"40.220.6.68\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=206.90.177.99 ::: serverIP=40.220.6.68 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "206.90.177.99",
"serverIP": "40.220.6.68",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"206.90.177.99","externalIp":"40.220.6.68","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=206.90.177.99 ::: serverIP=40.220.6.68 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"206.90.177.99","externalIp":"40.220.6.68","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=206.90.177.99 ::: serverIP=40.220.6.68 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-11T15:49:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 206.90.177.99
serverIP: 40.220.6.68
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"88.124.13.245","externalIp":"5.161.111.6","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=88.124.13.245 ::: serverIP=5.161.111.6 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-11T15:49:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"88.124.13.245\",\"externalIp\":\"5.161.111.6\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=88.124.13.245 ::: serverIP=5.161.111.6 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "88.124.13.245",
"serverIP": "5.161.111.6",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"88.124.13.245","externalIp":"5.161.111.6","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=88.124.13.245 ::: serverIP=5.161.111.6 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"88.124.13.245","externalIp":"5.161.111.6","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=88.124.13.245 ::: serverIP=5.161.111.6 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-11T15:49:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 88.124.13.245
serverIP: 5.161.111.6
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"64.221.166.97","externalIp":"3.230.115.122","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=64.221.166.97 ::: serverIP=3.230.115.122 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-11T15:49:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"64.221.166.97\",\"externalIp\":\"3.230.115.122\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=64.221.166.97 ::: serverIP=3.230.115.122 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "64.221.166.97",
"serverIP": "3.230.115.122",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"64.221.166.97","externalIp":"3.230.115.122","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=64.221.166.97 ::: serverIP=3.230.115.122 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"64.221.166.97","externalIp":"3.230.115.122","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=64.221.166.97 ::: serverIP=3.230.115.122 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-11T15:49:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 64.221.166.97
serverIP: 3.230.115.122
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"36.205.42.242","externalIp":"71.178.229.51","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=36.205.42.242 ::: serverIP=71.178.229.51 ::: userName=fish ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-06T09:52:09.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"36.205.42.242\",\"externalIp\":\"71.178.229.51\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-06T09:52:09.000Z\"} ::: clientIP=36.205.42.242 ::: serverIP=71.178.229.51 ::: userName=fish ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "gwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "gwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "36.205.42.242",
"serverIP": "71.178.229.51",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"36.205.42.242","externalIp":"71.178.229.51","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=36.205.42.242 ::: serverIP=71.178.229.51 ::: userName=fish ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"36.205.42.242","externalIp":"71.178.229.51","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=36.205.42.242 ::: serverIP=71.178.229.51 ::: userName=fish ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-06T09:52:09.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: gwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: gwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 36.205.42.242
serverIP: 71.178.229.51
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"2.45.91.201","externalIp":"66.54.115.215","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=2.45.91.201 ::: serverIP=66.54.115.215 ::: userName=janedoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-06T09:52:09.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"2.45.91.201\",\"externalIp\":\"66.54.115.215\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-06T09:52:09.000Z\"} ::: clientIP=2.45.91.201 ::: serverIP=66.54.115.215 ::: userName=janedoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "gwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "gwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "2.45.91.201",
"serverIP": "66.54.115.215",
"userName": "janedoe"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.