input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_stark.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@stark.bank"],"senderIP":"21.121.135.254","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=21.121.135.254 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=21.121.135.254 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: stephan.witolla@jobticket.de emailsendingserver: 212.227.126.135 emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM filehash: <169334821164.8788.14712446091347986247@jobticket.de> filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-29T22:31:33.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 21.121.135.254
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"129.230.169.92","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=129.230.169.92 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=129.230.169.92 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "stephan.witolla@jobticket.de", "emailsendingserver": "212.227.126.135", "emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "filehash": "<169334821164.8788.14712446091347986247@jobticket.de>", "filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attwayneed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_wayne.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@wayne.bank\"],\"senderIP\":\"129.230.169.92\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=129.230.169.92 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=129.230.169.92 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T22:31:33.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "129.230.169.92" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"129.230.169.92","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=129.230.169.92 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=129.230.169.92 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"129.230.169.92","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=129.230.169.92 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=129.230.169.92 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: stephan.witolla@jobticket.de emailsendingserver: 212.227.126.135 emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM filehash: <169334821164.8788.14712446091347986247@jobticket.de> filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-29T22:31:33.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 129.230.169.92
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"86.220.187.30","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=86.220.187.30 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=86.220.187.30 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "stephan.witolla@jobticket.de", "emailsendingserver": "212.227.126.135", "emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "filehash": "<169334821164.8788.14712446091347986247@jobticket.de>", "filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attwayneed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_wayne.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@wayne.bank\"],\"senderIP\":\"86.220.187.30\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=86.220.187.30 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=86.220.187.30 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T22:31:33.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "86.220.187.30" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"86.220.187.30","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=86.220.187.30 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=86.220.187.30 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"86.220.187.30","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=86.220.187.30 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=86.220.187.30 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: stephan.witolla@jobticket.de emailsendingserver: 212.227.126.135 emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM filehash: <169334821164.8788.14712446091347986247@jobticket.de> filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-29T22:31:33.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 86.220.187.30
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_umbrella.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@umbrella.bank"],"senderIP":"145.75.116.243","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=145.75.116.243 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=145.75.116.243 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "stephan.witolla@jobticket.de", "emailsendingserver": "212.227.126.135", "emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "filehash": "<169334821164.8788.14712446091347986247@jobticket.de>", "filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_umbrella.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@umbrella.bank\"],\"senderIP\":\"145.75.116.243\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=145.75.116.243 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=145.75.116.243 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T22:31:33.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "145.75.116.243" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_umbrella.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@umbrella.bank"],"senderIP":"145.75.116.243","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=145.75.116.243 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=145.75.116.243 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_umbrella.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@umbrella.bank"],"senderIP":"145.75.116.243","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=145.75.116.243 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=145.75.116.243 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: stephan.witolla@jobticket.de emailsendingserver: 212.227.126.135 emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM filehash: <169334821164.8788.14712446091347986247@jobticket.de> filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-29T22:31:33.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 145.75.116.243
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_umbrella.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@umbrella.bank"],"senderIP":"202.169.49.8","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=202.169.49.8 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=202.169.49.8 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "stephan.witolla@jobticket.de", "emailsendingserver": "212.227.126.135", "emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "filehash": "<169334821164.8788.14712446091347986247@jobticket.de>", "filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attumbrellaed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_umbrella.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@umbrella.bank\"],\"senderIP\":\"202.169.49.8\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=202.169.49.8 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=202.169.49.8 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T22:31:33.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "202.169.49.8" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_umbrella.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@umbrella.bank"],"senderIP":"202.169.49.8","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=202.169.49.8 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=202.169.49.8 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attumbrellaed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_umbrella.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@umbrella.bank"],"senderIP":"202.169.49.8","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=202.169.49.8 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=202.169.49.8 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: stephan.witolla@jobticket.de emailsendingserver: 212.227.126.135 emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM filehash: <169334821164.8788.14712446091347986247@jobticket.de> filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-29T22:31:33.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 202.169.49.8
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"249.211.10.203","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=249.211.10.203 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=249.211.10.203 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "stephan.witolla@jobticket.de", "emailsendingserver": "212.227.126.135", "emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "filehash": "<169334821164.8788.14712446091347986247@jobticket.de>", "filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attwayneed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_wayne.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@wayne.bank\"],\"senderIP\":\"249.211.10.203\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=249.211.10.203 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=249.211.10.203 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T22:31:33.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "249.211.10.203" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"249.211.10.203","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=249.211.10.203 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=249.211.10.203 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"249.211.10.203","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=249.211.10.203 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=249.211.10.203 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: stephan.witolla@jobticket.de emailsendingserver: 212.227.126.135 emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM filehash: <169334821164.8788.14712446091347986247@jobticket.de> filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-29T22:31:33.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 249.211.10.203
Explain this syslog message
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=84.8.109.10 dst=161.153.230.125 protocol=tcp sport=57619 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=84.8.109.10 dst=161.153.230.125 protocol=tcp sport=57619 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57619, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "84.8.109.10", "serverIP": "161.153.230.125" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=84.8.109.10 dst=161.153.230.125 protocol=tcp sport=57619 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=84.8.109.10 dst=161.153.230.125 protocol=tcp sport=57619 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57619 protocol: 6 streamName: meraki_l7_firewall clientIP: 84.8.109.10 serverIP: 161.153.230.125
Explain this syslog message
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=177.90.212.140 dst=217.158.147.154 protocol=tcp sport=57619 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=177.90.212.140 dst=217.158.147.154 protocol=tcp sport=57619 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57619, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "177.90.212.140", "serverIP": "217.158.147.154" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=177.90.212.140 dst=217.158.147.154 protocol=tcp sport=57619 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=177.90.212.140 dst=217.158.147.154 protocol=tcp sport=57619 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57619 protocol: 6 streamName: meraki_l7_firewall clientIP: 177.90.212.140 serverIP: 217.158.147.154
Explain this syslog message
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=106.114.9.183 dst=178.237.21.30 protocol=tcp sport=57619 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=106.114.9.183 dst=178.237.21.30 protocol=tcp sport=57619 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57619, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "106.114.9.183", "serverIP": "178.237.21.30" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=106.114.9.183 dst=178.237.21.30 protocol=tcp sport=57619 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=106.114.9.183 dst=178.237.21.30 protocol=tcp sport=57619 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57619 protocol: 6 streamName: meraki_l7_firewall clientIP: 106.114.9.183 serverIP: 178.237.21.30
Explain this syslog message
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=78.87.254.30 dst=208.123.197.23 protocol=tcp sport=57619 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=78.87.254.30 dst=208.123.197.23 protocol=tcp sport=57619 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57619, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "78.87.254.30", "serverIP": "208.123.197.23" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=78.87.254.30 dst=208.123.197.23 protocol=tcp sport=57619 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1674053056.366045981 NORDC_MX400_1 l7_firewall src=78.87.254.30 dst=208.123.197.23 protocol=tcp sport=57619 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57619 protocol: 6 streamName: meraki_l7_firewall clientIP: 78.87.254.30 serverIP: 208.123.197.23
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=230.90.144.83 dst=202.102.62.10 protocol=tcp sport=80 dport=57376 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=230.90.144.83 dst=202.102.62.10 protocol=tcp sport=80 dport=57376 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57376, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "202.102.62.10", "serverIP": "230.90.144.83" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=230.90.144.83 dst=202.102.62.10 protocol=tcp sport=80 dport=57376 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=230.90.144.83 dst=202.102.62.10 protocol=tcp sport=80 dport=57376 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57376 protocol: 6 streamName: meraki_l7_firewall clientIP: 202.102.62.10 serverIP: 230.90.144.83
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=68.182.95.232 dst=215.186.234.248 protocol=tcp sport=80 dport=57376 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=68.182.95.232 dst=215.186.234.248 protocol=tcp sport=80 dport=57376 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57376, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "215.186.234.248", "serverIP": "68.182.95.232" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=68.182.95.232 dst=215.186.234.248 protocol=tcp sport=80 dport=57376 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=68.182.95.232 dst=215.186.234.248 protocol=tcp sport=80 dport=57376 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57376 protocol: 6 streamName: meraki_l7_firewall clientIP: 215.186.234.248 serverIP: 68.182.95.232
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=36.14.226.106 dst=133.252.142.142 protocol=tcp sport=80 dport=57376 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=36.14.226.106 dst=133.252.142.142 protocol=tcp sport=80 dport=57376 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57376, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "133.252.142.142", "serverIP": "36.14.226.106" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=36.14.226.106 dst=133.252.142.142 protocol=tcp sport=80 dport=57376 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=36.14.226.106 dst=133.252.142.142 protocol=tcp sport=80 dport=57376 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57376 protocol: 6 streamName: meraki_l7_firewall clientIP: 133.252.142.142 serverIP: 36.14.226.106
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=41.53.100.217 dst=64.3.210.57 protocol=tcp sport=80 dport=57376 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=41.53.100.217 dst=64.3.210.57 protocol=tcp sport=80 dport=57376 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57376, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "64.3.210.57", "serverIP": "41.53.100.217" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=41.53.100.217 dst=64.3.210.57 protocol=tcp sport=80 dport=57376 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660781584.443324591 NORDC_MX400_1 l7_firewall src=41.53.100.217 dst=64.3.210.57 protocol=tcp sport=80 dport=57376 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57376 protocol: 6 streamName: meraki_l7_firewall clientIP: 64.3.210.57 serverIP: 41.53.100.217
Explain this syslog message
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=213.155.23.93 dst=128.100.159.153 protocol=udp sport=58021 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=213.155.23.93 dst=128.100.159.153 protocol=udp sport=58021 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 58021, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "213.155.23.93", "serverIP": "128.100.159.153" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=213.155.23.93 dst=128.100.159.153 protocol=udp sport=58021 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=213.155.23.93 dst=128.100.159.153 protocol=udp sport=58021 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 58021 protocol: 17 streamName: meraki_l7_firewall clientIP: 213.155.23.93 serverIP: 128.100.159.153
Explain this syslog message
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=14.171.0.34 dst=201.53.187.84 protocol=udp sport=58021 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=14.171.0.34 dst=201.53.187.84 protocol=udp sport=58021 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 58021, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "14.171.0.34", "serverIP": "201.53.187.84" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=14.171.0.34 dst=201.53.187.84 protocol=udp sport=58021 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=14.171.0.34 dst=201.53.187.84 protocol=udp sport=58021 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 58021 protocol: 17 streamName: meraki_l7_firewall clientIP: 14.171.0.34 serverIP: 201.53.187.84
Explain this syslog message
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=165.97.79.77 dst=9.29.223.123 protocol=udp sport=58021 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=165.97.79.77 dst=9.29.223.123 protocol=udp sport=58021 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 58021, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "165.97.79.77", "serverIP": "9.29.223.123" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=165.97.79.77 dst=9.29.223.123 protocol=udp sport=58021 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=165.97.79.77 dst=9.29.223.123 protocol=udp sport=58021 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 58021 protocol: 17 streamName: meraki_l7_firewall clientIP: 165.97.79.77 serverIP: 9.29.223.123
Explain this syslog message
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=122.120.10.24 dst=155.149.30.137 protocol=udp sport=58021 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=122.120.10.24 dst=155.149.30.137 protocol=udp sport=58021 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 58021, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "122.120.10.24", "serverIP": "155.149.30.137" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=122.120.10.24 dst=155.149.30.137 protocol=udp sport=58021 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1676049162.195194067 M31_MX67C_PV_MMI l7_firewall src=122.120.10.24 dst=155.149.30.137 protocol=udp sport=58021 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 58021 protocol: 17 streamName: meraki_l7_firewall clientIP: 122.120.10.24 serverIP: 155.149.30.137
Explain this syslog message
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=204.202.248.76 dst=229.182.164.218 protocol=udp sport=58021 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=204.202.248.76 dst=229.182.164.218 protocol=udp sport=58021 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 58021, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "204.202.248.76", "serverIP": "229.182.164.218" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=204.202.248.76 dst=229.182.164.218 protocol=udp sport=58021 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=204.202.248.76 dst=229.182.164.218 protocol=udp sport=58021 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 58021 protocol: 17 streamName: meraki_l7_firewall clientIP: 204.202.248.76 serverIP: 229.182.164.218
Explain this syslog message
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=36.102.90.135 dst=34.251.34.201 protocol=udp sport=58021 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=36.102.90.135 dst=34.251.34.201 protocol=udp sport=58021 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 58021, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "36.102.90.135", "serverIP": "34.251.34.201" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=36.102.90.135 dst=34.251.34.201 protocol=udp sport=58021 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=36.102.90.135 dst=34.251.34.201 protocol=udp sport=58021 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 58021 protocol: 17 streamName: meraki_l7_firewall clientIP: 36.102.90.135 serverIP: 34.251.34.201
Explain this syslog message
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=201.168.151.125 dst=140.222.28.193 protocol=udp sport=58021 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=201.168.151.125 dst=140.222.28.193 protocol=udp sport=58021 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 58021, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "201.168.151.125", "serverIP": "140.222.28.193" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=201.168.151.125 dst=140.222.28.193 protocol=udp sport=58021 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=201.168.151.125 dst=140.222.28.193 protocol=udp sport=58021 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 58021 protocol: 17 streamName: meraki_l7_firewall clientIP: 201.168.151.125 serverIP: 140.222.28.193
Explain this syslog message
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=37.243.2.242 dst=112.201.64.91 protocol=udp sport=58021 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=37.243.2.242 dst=112.201.64.91 protocol=udp sport=58021 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 58021, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "37.243.2.242", "serverIP": "112.201.64.91" }
Create a JSON artifact from the message
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=37.243.2.242 dst=112.201.64.91 protocol=udp sport=58021 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=71.25.173.65 1 1676049161.192257668 M31_MX67C_PV_MMI l7_firewall src=37.243.2.242 dst=112.201.64.91 protocol=udp sport=58021 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 58021 protocol: 17 streamName: meraki_l7_firewall clientIP: 37.243.2.242 serverIP: 112.201.64.91
Explain this syslog message
<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=99.99.126.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.198.230.4 spt=44920 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication="Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.198.230.4 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 44920, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1695040691968 ", "message": "<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=99.99.126.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=254.198.230.4 spt=44920 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication=\"Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36\" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.198.230.4 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "ProxyIP:93.159.230.87", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "254.198.230.4", "serverIP": "99.99.126.48", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=99.99.126.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.198.230.4 spt=44920 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication="Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.198.230.4 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=99.99.126.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=254.198.230.4 spt=44920 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication="Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=254.198.230.4 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 44920 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1695040691968 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:93.159.230.87', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 254.198.230.4 serverIP: 99.99.126.48 userName: -
Explain this syslog message
<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=211.225.144.112 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.230.213.153 spt=44920 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication="Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.230.213.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 44920, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1695040691968 ", "message": "<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=211.225.144.112 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=28.230.213.153 spt=44920 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication=\"Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36\" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.230.213.153 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "ProxyIP:93.159.230.87", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "28.230.213.153", "serverIP": "211.225.144.112", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=211.225.144.112 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.230.213.153 spt=44920 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication="Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.230.213.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 18 07:38:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=211.225.144.112 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.230.213.153 spt=44920 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:38:11 rt=1695040691968 request=/ requestClientApplication="Mozilla/5.0 (Linux; arm_64; Android 12; CPH2205) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.3.86.00 SA/3 Mobile Safari/537.36" dvchost=WAFirewall externalId=18aa84c5f00-479c5444 cn2=44920 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.230.213.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 44920 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1695040691968 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:93.159.230.87', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 28.230.213.153 serverIP: 211.225.144.112 userName: -
Explain this syslog message
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.208.224.156 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=140.143.49.40 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.143.49.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 51274, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/robots.txt", "localhostname": "WAFirewall", "localstarttime": "1695040663059 ", "message": "<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.208.224.156 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=140.143.49.40 spt=51274 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.143.49.40 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:213.180.203.151", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "140.143.49.40", "serverIP": "247.208.224.156", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.208.224.156 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=140.143.49.40 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.143.49.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.208.224.156 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=140.143.49.40 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.143.49.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 51274 facilitycode: 23 facilitylabel: local7 fqdn: /robots.txt localhostname: WAFirewall localstarttime: 1695040663059 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:213.180.203.151', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 140.143.49.40 serverIP: 247.208.224.156 userName: -
Explain this syslog message
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.250.176.115 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=58.15.25.228 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.15.25.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 51274, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/robots.txt", "localhostname": "WAFirewall", "localstarttime": "1695040663059 ", "message": "<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.250.176.115 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=58.15.25.228 spt=51274 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.15.25.228 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:213.180.203.151", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "58.15.25.228", "serverIP": "62.250.176.115", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.250.176.115 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=58.15.25.228 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.15.25.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.250.176.115 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=58.15.25.228 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.15.25.228 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 51274 facilitycode: 23 facilitylabel: local7 fqdn: /robots.txt localhostname: WAFirewall localstarttime: 1695040663059 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:213.180.203.151', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 58.15.25.228 serverIP: 62.250.176.115 userName: -
Explain this syslog message
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.85.198.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.227.151.229 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.227.151.229 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 51274, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/robots.txt", "localhostname": "WAFirewall", "localstarttime": "1695040663059 ", "message": "<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.85.198.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=252.227.151.229 spt=51274 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)\" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.227.151.229 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:213.180.203.151", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "252.227.151.229", "serverIP": "77.85.198.222", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.85.198.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.227.151.229 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.227.151.229 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 18 07:37:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.85.198.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.227.151.229 spt=51274 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 18 2023 07:37:43 rt=1695040663059 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" dvchost=WAFirewall externalId=18aa84bede2-9cc61c3c cn2=51274 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.227.151.229 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 51274 facilitycode: 23 facilitylabel: local7 fqdn: /robots.txt localhostname: WAFirewall localstarttime: 1695040663059 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:213.180.203.151', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 252.227.151.229 serverIP: 77.85.198.222 userName: -
Explain this syslog message
<185>Feb 6 17:22:36 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=255.216.61.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=253.205.203.55 spt=43590 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:22:36 rt=1675725756041 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=1862909d689-6b02d221 cn2=43590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.205.203.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "FollowUpAction:NONE", "ProxyIP:152.89.196.211", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 17:22:36 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=255.216.61.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=253.205.203.55 spt=43590 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:22:36 rt=1675725756041 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=1862909d689-6b02d221 cn2=43590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.205.203.55 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675725756041 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 43590, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "253.205.203.55", "serverIP": "255.216.61.16", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 17:22:36 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=255.216.61.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=253.205.203.55 spt=43590 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:22:36 rt=1675725756041 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=1862909d689-6b02d221 cn2=43590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.205.203.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 17:22:36 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=255.216.61.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=253.205.203.55 spt=43590 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:22:36 rt=1675725756041 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=1862909d689-6b02d221 cn2=43590 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=253.205.203.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1675725756041 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 43590 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 253.205.203.55 serverIP: 255.216.61.16 userName: -
Explain this syslog message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=136.182.53.14 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=91.186.213.141 spt=41718 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=91.186.213.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:185.224.128.219", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=136.182.53.14 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=91.186.213.141 spt=41718 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=91.186.213.141 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675725817999 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/_asterisk/", "clientport": 41718, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "91.186.213.141", "serverIP": "136.182.53.14", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=136.182.53.14 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=91.186.213.141 spt=41718 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=91.186.213.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=136.182.53.14 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=91.186.213.141 spt=41718 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=91.186.213.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675725817999 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /_asterisk/ clientport: 41718 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 91.186.213.141 serverIP: 136.182.53.14 userName: -
Explain this syslog message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=131.215.109.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=76.81.81.149 spt=41718 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.81.81.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:185.224.128.219", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=131.215.109.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=76.81.81.149 spt=41718 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.81.81.149 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675725817999 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/_asterisk/", "clientport": 41718, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "76.81.81.149", "serverIP": "131.215.109.222", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=131.215.109.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=76.81.81.149 spt=41718 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.81.81.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=131.215.109.222 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=76.81.81.149 spt=41718 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817999 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac88f-b7e8a28c cn2=41718 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.81.81.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675725817999 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /_asterisk/ clientport: 41718 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 76.81.81.149 serverIP: 131.215.109.222 userName: -
Explain this syslog message
<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=231.48.205.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.232.159.200 spt=34938 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.232.159.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:185.224.128.219", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=231.48.205.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=184.232.159.200 spt=34938 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.232.159.200 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675725817373 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/_asterisk/", "clientport": 34938, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "184.232.159.200", "serverIP": "231.48.205.190", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=231.48.205.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.232.159.200 spt=34938 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.232.159.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=231.48.205.190 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.232.159.200 spt=34938 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.232.159.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675725817373 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /_asterisk/ clientport: 34938 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 184.232.159.200 serverIP: 231.48.205.190 userName: -
Explain this syslog message
<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=179.76.125.208 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.102.60.244 spt=34938 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.102.60.244 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:185.224.128.219", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=179.76.125.208 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=97.102.60.244 spt=34938 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.102.60.244 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675725817373 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/_asterisk/", "clientport": 34938, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "97.102.60.244", "serverIP": "179.76.125.208", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=179.76.125.208 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.102.60.244 spt=34938 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.102.60.244 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 17:23:37 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=179.76.125.208 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=97.102.60.244 spt=34938 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:37 rt=1675725817373 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac61d-b6e99593 cn2=34938 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=97.102.60.244 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675725817373 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /_asterisk/ clientport: 34938 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 97.102.60.244 serverIP: 179.76.125.208 userName: -
Explain this syslog message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=18.64.119.40 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.228.201.39 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.228.201.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:185.224.128.219", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=18.64.119.40 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=139.228.201.39 spt=37156 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.228.201.39 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675725818049 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/_asterisk/", "clientport": 37156, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "139.228.201.39", "serverIP": "18.64.119.40", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=18.64.119.40 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.228.201.39 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.228.201.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=18.64.119.40 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.228.201.39 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.228.201.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675725818049 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /_asterisk/ clientport: 37156 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 139.228.201.39 serverIP: 18.64.119.40 userName: -
Explain this syslog message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.73.31.41 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=90.213.174.32 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=90.213.174.32 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:185.224.128.219", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.73.31.41 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=90.213.174.32 spt=37156 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=90.213.174.32 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675725818049 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/_asterisk/", "clientport": 37156, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "90.213.174.32", "serverIP": "107.73.31.41", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.73.31.41 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=90.213.174.32 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=90.213.174.32 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=107.73.31.41 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=90.213.174.32 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=90.213.174.32 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675725818049 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /_asterisk/ clientport: 37156 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 90.213.174.32 serverIP: 107.73.31.41 userName: -
Explain this syslog message