input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_stark.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@stark.bank"],"senderIP":"21.121.135.254","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=21.121.135.254 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=21.121.135.254 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: stephan.witolla@jobticket.de
emailsendingserver: 212.227.126.135
emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
filehash: <169334821164.8788.14712446091347986247@jobticket.de>
filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-29T22:31:33.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 21.121.135.254 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"129.230.169.92","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=129.230.169.92 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=129.230.169.92 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "stephan.witolla@jobticket.de",
"emailsendingserver": "212.227.126.135",
"emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"filehash": "<169334821164.8788.14712446091347986247@jobticket.de>",
"filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attwayneed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_wayne.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@wayne.bank\"],\"senderIP\":\"129.230.169.92\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=129.230.169.92 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=129.230.169.92 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T22:31:33.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "129.230.169.92"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"129.230.169.92","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=129.230.169.92 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=129.230.169.92 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"129.230.169.92","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=129.230.169.92 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=129.230.169.92 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: stephan.witolla@jobticket.de
emailsendingserver: 212.227.126.135
emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
filehash: <169334821164.8788.14712446091347986247@jobticket.de>
filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-29T22:31:33.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 129.230.169.92 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"86.220.187.30","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=86.220.187.30 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=86.220.187.30 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "stephan.witolla@jobticket.de",
"emailsendingserver": "212.227.126.135",
"emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"filehash": "<169334821164.8788.14712446091347986247@jobticket.de>",
"filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attwayneed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_wayne.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@wayne.bank\"],\"senderIP\":\"86.220.187.30\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=86.220.187.30 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=86.220.187.30 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T22:31:33.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "86.220.187.30"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"86.220.187.30","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=86.220.187.30 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=86.220.187.30 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"86.220.187.30","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=86.220.187.30 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=86.220.187.30 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: stephan.witolla@jobticket.de
emailsendingserver: 212.227.126.135
emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
filehash: <169334821164.8788.14712446091347986247@jobticket.de>
filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-29T22:31:33.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 86.220.187.30 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_umbrella.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@umbrella.bank"],"senderIP":"145.75.116.243","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=145.75.116.243 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=145.75.116.243 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "stephan.witolla@jobticket.de",
"emailsendingserver": "212.227.126.135",
"emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"filehash": "<169334821164.8788.14712446091347986247@jobticket.de>",
"filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_umbrella.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@umbrella.bank\"],\"senderIP\":\"145.75.116.243\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=145.75.116.243 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=145.75.116.243 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T22:31:33.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "145.75.116.243"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_umbrella.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@umbrella.bank"],"senderIP":"145.75.116.243","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=145.75.116.243 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=145.75.116.243 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_umbrella.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@umbrella.bank"],"senderIP":"145.75.116.243","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=145.75.116.243 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=145.75.116.243 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: stephan.witolla@jobticket.de
emailsendingserver: 212.227.126.135
emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
filehash: <169334821164.8788.14712446091347986247@jobticket.de>
filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-29T22:31:33.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 145.75.116.243 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_umbrella.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@umbrella.bank"],"senderIP":"202.169.49.8","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=202.169.49.8 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=202.169.49.8 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "stephan.witolla@jobticket.de",
"emailsendingserver": "212.227.126.135",
"emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"filehash": "<169334821164.8788.14712446091347986247@jobticket.de>",
"filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_umbrella.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@umbrella.bank\"],\"senderIP\":\"202.169.49.8\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=202.169.49.8 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=202.169.49.8 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T22:31:33.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "202.169.49.8"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_umbrella.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@umbrella.bank"],"senderIP":"202.169.49.8","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=202.169.49.8 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=202.169.49.8 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_umbrella.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@umbrella.bank"],"senderIP":"202.169.49.8","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=202.169.49.8 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=202.169.49.8 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: stephan.witolla@jobticket.de
emailsendingserver: 212.227.126.135
emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
filehash: <169334821164.8788.14712446091347986247@jobticket.de>
filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-29T22:31:33.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 202.169.49.8 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"249.211.10.203","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=249.211.10.203 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=249.211.10.203 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "stephan.witolla@jobticket.de",
"emailsendingserver": "212.227.126.135",
"emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"filehash": "<169334821164.8788.14712446091347986247@jobticket.de>",
"filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attwayneed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_wayne.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@wayne.bank\"],\"senderIP\":\"249.211.10.203\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=249.211.10.203 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=249.211.10.203 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T22:31:33.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "249.211.10.203"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"249.211.10.203","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=249.211.10.203 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=249.211.10.203 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"249.211.10.203","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=249.211.10.203 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=249.211.10.203 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: stephan.witolla@jobticket.de
emailsendingserver: 212.227.126.135
emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
filehash: <169334821164.8788.14712446091347986247@jobticket.de>
filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-29T22:31:33.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 249.211.10.203 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=84.8.109.10 dst=161.153.230.125 protocol=tcp sport=57619 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=84.8.109.10 dst=161.153.230.125 protocol=tcp sport=57619 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57619,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "84.8.109.10",
"serverIP": "161.153.230.125"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=84.8.109.10 dst=161.153.230.125 protocol=tcp sport=57619 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=84.8.109.10 dst=161.153.230.125 protocol=tcp sport=57619 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57619
protocol: 6
streamName: meraki_l7_firewall
clientIP: 84.8.109.10
serverIP: 161.153.230.125 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=177.90.212.140 dst=217.158.147.154 protocol=tcp sport=57619 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=177.90.212.140 dst=217.158.147.154 protocol=tcp sport=57619 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57619,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "177.90.212.140",
"serverIP": "217.158.147.154"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=177.90.212.140 dst=217.158.147.154 protocol=tcp sport=57619 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=177.90.212.140 dst=217.158.147.154 protocol=tcp sport=57619 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57619
protocol: 6
streamName: meraki_l7_firewall
clientIP: 177.90.212.140
serverIP: 217.158.147.154 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=106.114.9.183 dst=178.237.21.30 protocol=tcp sport=57619 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=106.114.9.183 dst=178.237.21.30 protocol=tcp sport=57619 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57619,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "106.114.9.183",
"serverIP": "178.237.21.30"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=106.114.9.183 dst=178.237.21.30 protocol=tcp sport=57619 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=106.114.9.183 dst=178.237.21.30 protocol=tcp sport=57619 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57619
protocol: 6
streamName: meraki_l7_firewall
clientIP: 106.114.9.183
serverIP: 178.237.21.30 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=78.87.254.30 dst=208.123.197.23 protocol=tcp sport=57619 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=78.87.254.30 dst=208.123.197.23 protocol=tcp sport=57619 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57619,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "78.87.254.30",
"serverIP": "208.123.197.23"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=78.87.254.30 dst=208.123.197.23 protocol=tcp sport=57619 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=78.87.254.30 dst=208.123.197.23 protocol=tcp sport=57619 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57619
protocol: 6
streamName: meraki_l7_firewall
clientIP: 78.87.254.30
serverIP: 208.123.197.23 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=230.90.144.83 dst=202.102.62.10 protocol=tcp sport=80 dport=57376 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=230.90.144.83 dst=202.102.62.10 protocol=tcp sport=80 dport=57376 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57376,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "202.102.62.10",
"serverIP": "230.90.144.83"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=230.90.144.83 dst=202.102.62.10 protocol=tcp sport=80 dport=57376 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=230.90.144.83 dst=202.102.62.10 protocol=tcp sport=80 dport=57376 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57376
protocol: 6
streamName: meraki_l7_firewall
clientIP: 202.102.62.10
serverIP: 230.90.144.83 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=68.182.95.232 dst=215.186.234.248 protocol=tcp sport=80 dport=57376 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=68.182.95.232 dst=215.186.234.248 protocol=tcp sport=80 dport=57376 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57376,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "215.186.234.248",
"serverIP": "68.182.95.232"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=68.182.95.232 dst=215.186.234.248 protocol=tcp sport=80 dport=57376 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=68.182.95.232 dst=215.186.234.248 protocol=tcp sport=80 dport=57376 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57376
protocol: 6
streamName: meraki_l7_firewall
clientIP: 215.186.234.248
serverIP: 68.182.95.232 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=36.14.226.106 dst=133.252.142.142 protocol=tcp sport=80 dport=57376 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=36.14.226.106 dst=133.252.142.142 protocol=tcp sport=80 dport=57376 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57376,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "133.252.142.142",
"serverIP": "36.14.226.106"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=36.14.226.106 dst=133.252.142.142 protocol=tcp sport=80 dport=57376 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=36.14.226.106 dst=133.252.142.142 protocol=tcp sport=80 dport=57376 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57376
protocol: 6
streamName: meraki_l7_firewall
clientIP: 133.252.142.142
serverIP: 36.14.226.106 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=41.53.100.217 dst=64.3.210.57 protocol=tcp sport=80 dport=57376 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=41.53.100.217 dst=64.3.210.57 protocol=tcp sport=80 dport=57376 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57376,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "64.3.210.57",
"serverIP": "41.53.100.217"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=41.53.100.217 dst=64.3.210.57 protocol=tcp sport=80 dport=57376 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=41.53.100.217 dst=64.3.210.57 protocol=tcp sport=80 dport=57376 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57376
protocol: 6
streamName: meraki_l7_firewall
clientIP: 64.3.210.57
serverIP: 41.53.100.217 | Explain this syslog message |
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=213.155.23.93 dst=128.100.159.153 protocol=udp sport=58021 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=213.155.23.93 dst=128.100.159.153 protocol=udp sport=58021 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58021,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "213.155.23.93",
"serverIP": "128.100.159.153"
} | Create a JSON artifact from the message |
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=213.155.23.93 dst=128.100.159.153 protocol=udp sport=58021 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=213.155.23.93 dst=128.100.159.153 protocol=udp sport=58021 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58021
protocol: 17
streamName: meraki_l7_firewall
clientIP: 213.155.23.93
serverIP: 128.100.159.153 | Explain this syslog message |
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=14.171.0.34 dst=201.53.187.84 protocol=udp sport=58021 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=14.171.0.34 dst=201.53.187.84 protocol=udp sport=58021 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58021,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "14.171.0.34",
"serverIP": "201.53.187.84"
} | Create a JSON artifact from the message |
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=14.171.0.34 dst=201.53.187.84 protocol=udp sport=58021 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=14.171.0.34 dst=201.53.187.84 protocol=udp sport=58021 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58021
protocol: 17
streamName: meraki_l7_firewall
clientIP: 14.171.0.34
serverIP: 201.53.187.84 | Explain this syslog message |
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=165.97.79.77 dst=9.29.223.123 protocol=udp sport=58021 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=165.97.79.77 dst=9.29.223.123 protocol=udp sport=58021 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58021,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "165.97.79.77",
"serverIP": "9.29.223.123"
} | Create a JSON artifact from the message |
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=165.97.79.77 dst=9.29.223.123 protocol=udp sport=58021 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=165.97.79.77 dst=9.29.223.123 protocol=udp sport=58021 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58021
protocol: 17
streamName: meraki_l7_firewall
clientIP: 165.97.79.77
serverIP: 9.29.223.123 | Explain this syslog message |
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=122.120.10.24 dst=155.149.30.137 protocol=udp sport=58021 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=122.120.10.24 dst=155.149.30.137 protocol=udp sport=58021 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58021,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "122.120.10.24",
"serverIP": "155.149.30.137"
} | Create a JSON artifact from the message |
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=122.120.10.24 dst=155.149.30.137 protocol=udp sport=58021 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=122.120.10.24 dst=155.149.30.137 protocol=udp sport=58021 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58021
protocol: 17
streamName: meraki_l7_firewall
clientIP: 122.120.10.24
serverIP: 155.149.30.137 | Explain this syslog message |
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=204.202.248.76 dst=229.182.164.218 protocol=udp sport=58021 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=204.202.248.76 dst=229.182.164.218 protocol=udp sport=58021 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58021,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "204.202.248.76",
"serverIP": "229.182.164.218"
} | Create a JSON artifact from the message |
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=204.202.248.76 dst=229.182.164.218 protocol=udp sport=58021 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=204.202.248.76 dst=229.182.164.218 protocol=udp sport=58021 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58021
protocol: 17
streamName: meraki_l7_firewall
clientIP: 204.202.248.76
serverIP: 229.182.164.218 | Explain this syslog message |
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=36.102.90.135 dst=34.251.34.201 protocol=udp sport=58021 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=36.102.90.135 dst=34.251.34.201 protocol=udp sport=58021 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58021,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "36.102.90.135",
"serverIP": "34.251.34.201"
} | Create a JSON artifact from the message |
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=36.102.90.135 dst=34.251.34.201 protocol=udp sport=58021 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=36.102.90.135 dst=34.251.34.201 protocol=udp sport=58021 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58021
protocol: 17
streamName: meraki_l7_firewall
clientIP: 36.102.90.135
serverIP: 34.251.34.201 | Explain this syslog message |
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=201.168.151.125 dst=140.222.28.193 protocol=udp sport=58021 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=201.168.151.125 dst=140.222.28.193 protocol=udp sport=58021 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58021,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "201.168.151.125",
"serverIP": "140.222.28.193"
} | Create a JSON artifact from the message |
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=201.168.151.125 dst=140.222.28.193 protocol=udp sport=58021 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=201.168.151.125 dst=140.222.28.193 protocol=udp sport=58021 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58021
protocol: 17
streamName: meraki_l7_firewall
clientIP: 201.168.151.125
serverIP: 140.222.28.193 | Explain this syslog message |
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=37.243.2.242 dst=112.201.64.91 protocol=udp sport=58021 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=37.243.2.242 dst=112.201.64.91 protocol=udp sport=58021 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58021,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "37.243.2.242",
"serverIP": "112.201.64.91"
} | Create a JSON artifact from the message |
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=37.243.2.242 dst=112.201.64.91 protocol=udp sport=58021 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=37.243.2.242 dst=112.201.64.91 protocol=udp sport=58021 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58021
protocol: 17
streamName: meraki_l7_firewall
clientIP: 37.243.2.242
serverIP: 112.201.64.91 | Explain this syslog message |
<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=99.99.126.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.198.230.4 spt=44920 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication="Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.198.230.4 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44920,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1695040691968 ",
"message": "<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=99.99.126.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=254.198.230.4 spt=44920 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication=\"Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36\" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.198.230.4 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:93.159.230.87",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "254.198.230.4",
"serverIP": "99.99.126.48",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=99.99.126.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.198.230.4 spt=44920 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication="Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.198.230.4 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=99.99.126.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.198.230.4 spt=44920 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication="Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.198.230.4 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44920
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1695040691968
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:93.159.230.87', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 254.198.230.4
serverIP: 99.99.126.48
userName: - | Explain this syslog message |
<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=211.225.144.112 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.230.213.153 spt=44920 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication="Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.230.213.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44920,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1695040691968 ",
"message": "<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=211.225.144.112 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=28.230.213.153 spt=44920 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication=\"Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36\" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.230.213.153 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:93.159.230.87",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "28.230.213.153",
"serverIP": "211.225.144.112",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=211.225.144.112 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.230.213.153 spt=44920 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication="Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.230.213.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=211.225.144.112 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.230.213.153 spt=44920 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication="Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.230.213.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 44920
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1695040691968
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:93.159.230.87', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 28.230.213.153
serverIP: 211.225.144.112
userName: - | Explain this syslog message |
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.208.224.156 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=140.143.49.40 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.143.49.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 51274,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1695040663059 ",
"message": "<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.208.224.156 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=140.143.49.40 spt=51274 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.143.49.40 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:213.180.203.151",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "140.143.49.40",
"serverIP": "247.208.224.156",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.208.224.156 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=140.143.49.40 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.143.49.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.208.224.156 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=140.143.49.40 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.143.49.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 51274
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1695040663059
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:213.180.203.151', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 140.143.49.40
serverIP: 247.208.224.156
userName: - | Explain this syslog message |
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.250.176.115 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=58.15.25.228 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.15.25.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 51274,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1695040663059 ",
"message": "<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.250.176.115 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=58.15.25.228 spt=51274 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.15.25.228 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:213.180.203.151",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "58.15.25.228",
"serverIP": "62.250.176.115",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.250.176.115 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=58.15.25.228 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.15.25.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.250.176.115 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=58.15.25.228 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.15.25.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 51274
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1695040663059
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:213.180.203.151', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 58.15.25.228
serverIP: 62.250.176.115
userName: - | Explain this syslog message |
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.85.198.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.227.151.229 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.227.151.229 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 51274,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1695040663059 ",
"message": "<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.85.198.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=252.227.151.229 spt=51274 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.227.151.229 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:213.180.203.151",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "252.227.151.229",
"serverIP": "77.85.198.222",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.85.198.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.227.151.229 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.227.151.229 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.85.198.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.227.151.229 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.227.151.229 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 51274
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1695040663059
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:213.180.203.151', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 252.227.151.229
serverIP: 77.85.198.222
userName: - | Explain this syslog message |
<185>Feb 6 17:22:36 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=255.216.61.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=253.205.203.55 spt=43590 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:22:36 rt=1675725756041 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=1862909d689-6b02d221 cn2=43590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.205.203.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 17:22:36 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=255.216.61.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=253.205.203.55 spt=43590 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:22:36 rt=1675725756041 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=1862909d689-6b02d221 cn2=43590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.205.203.55 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675725756041 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 43590,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "253.205.203.55",
"serverIP": "255.216.61.16",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 17:22:36 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=255.216.61.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=253.205.203.55 spt=43590 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:22:36 rt=1675725756041 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=1862909d689-6b02d221 cn2=43590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.205.203.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 17:22:36 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=255.216.61.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=253.205.203.55 spt=43590 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:22:36 rt=1675725756041 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=1862909d689-6b02d221 cn2=43590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.205.203.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1675725756041
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 43590
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 253.205.203.55
serverIP: 255.216.61.16
userName: - | Explain this syslog message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=136.182.53.14 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=91.186.213.141 spt=41718 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=91.186.213.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:185.224.128.219",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=136.182.53.14 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=91.186.213.141 spt=41718 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=91.186.213.141 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675725817999 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/_asterisk/",
"clientport": 41718,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "91.186.213.141",
"serverIP": "136.182.53.14",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=136.182.53.14 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=91.186.213.141 spt=41718 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=91.186.213.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=136.182.53.14 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=91.186.213.141 spt=41718 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=91.186.213.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675725817999
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /_asterisk/
clientport: 41718
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 91.186.213.141
serverIP: 136.182.53.14
userName: - | Explain this syslog message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=131.215.109.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=76.81.81.149 spt=41718 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.81.81.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:185.224.128.219",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=131.215.109.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=76.81.81.149 spt=41718 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.81.81.149 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675725817999 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/_asterisk/",
"clientport": 41718,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "76.81.81.149",
"serverIP": "131.215.109.222",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=131.215.109.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=76.81.81.149 spt=41718 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.81.81.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=131.215.109.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=76.81.81.149 spt=41718 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.81.81.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675725817999
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /_asterisk/
clientport: 41718
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 76.81.81.149
serverIP: 131.215.109.222
userName: - | Explain this syslog message |
<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=231.48.205.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.232.159.200 spt=34938 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.232.159.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:185.224.128.219",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=231.48.205.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=184.232.159.200 spt=34938 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.232.159.200 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675725817373 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/_asterisk/",
"clientport": 34938,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "184.232.159.200",
"serverIP": "231.48.205.190",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=231.48.205.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.232.159.200 spt=34938 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.232.159.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=231.48.205.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.232.159.200 spt=34938 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.232.159.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675725817373
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /_asterisk/
clientport: 34938
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 184.232.159.200
serverIP: 231.48.205.190
userName: - | Explain this syslog message |
<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=179.76.125.208 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.102.60.244 spt=34938 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.102.60.244 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:185.224.128.219",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=179.76.125.208 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=97.102.60.244 spt=34938 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.102.60.244 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675725817373 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/_asterisk/",
"clientport": 34938,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "97.102.60.244",
"serverIP": "179.76.125.208",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=179.76.125.208 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.102.60.244 spt=34938 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.102.60.244 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=179.76.125.208 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.102.60.244 spt=34938 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.102.60.244 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675725817373
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /_asterisk/
clientport: 34938
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 97.102.60.244
serverIP: 179.76.125.208
userName: - | Explain this syslog message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=18.64.119.40 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.228.201.39 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.228.201.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:185.224.128.219",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=18.64.119.40 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=139.228.201.39 spt=37156 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.228.201.39 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675725818049 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/_asterisk/",
"clientport": 37156,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "139.228.201.39",
"serverIP": "18.64.119.40",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=18.64.119.40 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.228.201.39 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.228.201.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=18.64.119.40 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.228.201.39 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.228.201.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675725818049
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /_asterisk/
clientport: 37156
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 139.228.201.39
serverIP: 18.64.119.40
userName: - | Explain this syslog message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.73.31.41 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=90.213.174.32 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=90.213.174.32 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:185.224.128.219",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.73.31.41 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=90.213.174.32 spt=37156 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=90.213.174.32 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675725818049 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/_asterisk/",
"clientport": 37156,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "90.213.174.32",
"serverIP": "107.73.31.41",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.73.31.41 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=90.213.174.32 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=90.213.174.32 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.73.31.41 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=90.213.174.32 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=90.213.174.32 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675725818049
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /_asterisk/
clientport: 37156
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 90.213.174.32
serverIP: 107.73.31.41
userName: - | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.