input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=63.137.222.166 dst=4.215.71.177 protocol=tcp sport=62360 dport=443 decision=blocked | {
"action": "block",
"clientport": 62360,
"message": "<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=63.137.222.166 dst=4.215.71.177 protocol=tcp sport=62360 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "63.137.222.166",
"serverIP": "4.215.71.177"
} | Create a JSON artifact from the message |
<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=63.137.222.166 dst=4.215.71.177 protocol=tcp sport=62360 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=63.137.222.166 dst=4.215.71.177 protocol=tcp sport=62360 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62360
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 63.137.222.166
serverIP: 4.215.71.177 | Explain this syslog message |
<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=40.184.97.134 dst=209.246.79.211 protocol=tcp sport=62360 dport=443 decision=blocked | {
"action": "block",
"clientport": 62360,
"message": "<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=40.184.97.134 dst=209.246.79.211 protocol=tcp sport=62360 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "40.184.97.134",
"serverIP": "209.246.79.211"
} | Create a JSON artifact from the message |
<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=40.184.97.134 dst=209.246.79.211 protocol=tcp sport=62360 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=40.184.97.134 dst=209.246.79.211 protocol=tcp sport=62360 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62360
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 40.184.97.134
serverIP: 209.246.79.211 | Explain this syslog message |
<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=153.44.165.162 dst=244.108.132.155 protocol=tcp sport=62360 dport=443 decision=blocked | {
"action": "block",
"clientport": 62360,
"message": "<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=153.44.165.162 dst=244.108.132.155 protocol=tcp sport=62360 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "153.44.165.162",
"serverIP": "244.108.132.155"
} | Create a JSON artifact from the message |
<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=153.44.165.162 dst=244.108.132.155 protocol=tcp sport=62360 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=153.44.165.162 dst=244.108.132.155 protocol=tcp sport=62360 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62360
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 153.44.165.162
serverIP: 244.108.132.155 | Explain this syslog message |
<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=247.217.183.135 dst=54.72.170.43 protocol=tcp sport=62360 dport=443 decision=blocked | {
"action": "block",
"clientport": 62360,
"message": "<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=247.217.183.135 dst=54.72.170.43 protocol=tcp sport=62360 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "247.217.183.135",
"serverIP": "54.72.170.43"
} | Create a JSON artifact from the message |
<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=247.217.183.135 dst=54.72.170.43 protocol=tcp sport=62360 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=70.90.252.85 1 1688799262.341319626 H161_MX67C_SavAbercorn l7_firewall src=247.217.183.135 dst=54.72.170.43 protocol=tcp sport=62360 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62360
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 247.217.183.135
serverIP: 54.72.170.43 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=2.55.241.107 dst=168.66.139.133 protocol=tcp sport=55149 dport=443 decision=blocked | {
"action": "block",
"clientport": 55149,
"message": "<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=2.55.241.107 dst=168.66.139.133 protocol=tcp sport=55149 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "2.55.241.107",
"serverIP": "168.66.139.133"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=2.55.241.107 dst=168.66.139.133 protocol=tcp sport=55149 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=2.55.241.107 dst=168.66.139.133 protocol=tcp sport=55149 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55149
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 2.55.241.107
serverIP: 168.66.139.133 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=70.125.145.181 dst=153.209.151.179 protocol=tcp sport=55149 dport=443 decision=blocked | {
"action": "block",
"clientport": 55149,
"message": "<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=70.125.145.181 dst=153.209.151.179 protocol=tcp sport=55149 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "70.125.145.181",
"serverIP": "153.209.151.179"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=70.125.145.181 dst=153.209.151.179 protocol=tcp sport=55149 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=70.125.145.181 dst=153.209.151.179 protocol=tcp sport=55149 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55149
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 70.125.145.181
serverIP: 153.209.151.179 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=64.174.88.120 dst=241.53.13.255 protocol=tcp sport=55149 dport=443 decision=blocked | {
"action": "block",
"clientport": 55149,
"message": "<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=64.174.88.120 dst=241.53.13.255 protocol=tcp sport=55149 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "64.174.88.120",
"serverIP": "241.53.13.255"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=64.174.88.120 dst=241.53.13.255 protocol=tcp sport=55149 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=64.174.88.120 dst=241.53.13.255 protocol=tcp sport=55149 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55149
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 64.174.88.120
serverIP: 241.53.13.255 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=210.75.133.171 dst=252.134.220.68 protocol=tcp sport=55149 dport=443 decision=blocked | {
"action": "block",
"clientport": 55149,
"message": "<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=210.75.133.171 dst=252.134.220.68 protocol=tcp sport=55149 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "210.75.133.171",
"serverIP": "252.134.220.68"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=210.75.133.171 dst=252.134.220.68 protocol=tcp sport=55149 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688799874.758731369 NORDC_MX400_1 l7_firewall src=210.75.133.171 dst=252.134.220.68 protocol=tcp sport=55149 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55149
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 210.75.133.171
serverIP: 252.134.220.68 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=127.27.213.125 dst=161.33.213.238 protocol=tcp sport=59623 dport=443 decision=blocked | {
"action": "block",
"clientport": 59623,
"message": "<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=127.27.213.125 dst=161.33.213.238 protocol=tcp sport=59623 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "127.27.213.125",
"serverIP": "161.33.213.238"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=127.27.213.125 dst=161.33.213.238 protocol=tcp sport=59623 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=127.27.213.125 dst=161.33.213.238 protocol=tcp sport=59623 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59623
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 127.27.213.125
serverIP: 161.33.213.238 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=125.199.29.158 dst=211.165.114.52 protocol=tcp sport=59623 dport=443 decision=blocked | {
"action": "block",
"clientport": 59623,
"message": "<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=125.199.29.158 dst=211.165.114.52 protocol=tcp sport=59623 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "125.199.29.158",
"serverIP": "211.165.114.52"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=125.199.29.158 dst=211.165.114.52 protocol=tcp sport=59623 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=125.199.29.158 dst=211.165.114.52 protocol=tcp sport=59623 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59623
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 125.199.29.158
serverIP: 211.165.114.52 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=104.18.156.194 dst=121.37.231.187 protocol=tcp sport=59623 dport=443 decision=blocked | {
"action": "block",
"clientport": 59623,
"message": "<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=104.18.156.194 dst=121.37.231.187 protocol=tcp sport=59623 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "104.18.156.194",
"serverIP": "121.37.231.187"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=104.18.156.194 dst=121.37.231.187 protocol=tcp sport=59623 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=104.18.156.194 dst=121.37.231.187 protocol=tcp sport=59623 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59623
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 104.18.156.194
serverIP: 121.37.231.187 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=134.222.137.187 dst=129.37.207.216 protocol=tcp sport=59623 dport=443 decision=blocked | {
"action": "block",
"clientport": 59623,
"message": "<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=134.222.137.187 dst=129.37.207.216 protocol=tcp sport=59623 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "134.222.137.187",
"serverIP": "129.37.207.216"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=134.222.137.187 dst=129.37.207.216 protocol=tcp sport=59623 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1689955428.526253565 M61_MX67C_Savannah l7_firewall src=134.222.137.187 dst=129.37.207.216 protocol=tcp sport=59623 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59623
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 134.222.137.187
serverIP: 129.37.207.216 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=74.20.71.22 dst=25.217.78.215 protocol=tcp sport=443 dport=24736 decision=blocked | {
"action": "block",
"clientport": 24736,
"message": "<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=74.20.71.22 dst=25.217.78.215 protocol=tcp sport=443 dport=24736 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "25.217.78.215",
"serverIP": "74.20.71.22"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=74.20.71.22 dst=25.217.78.215 protocol=tcp sport=443 dport=24736 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=74.20.71.22 dst=25.217.78.215 protocol=tcp sport=443 dport=24736 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 24736
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 25.217.78.215
serverIP: 74.20.71.22 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=137.118.84.204 dst=133.63.54.158 protocol=tcp sport=443 dport=24736 decision=blocked | {
"action": "block",
"clientport": 24736,
"message": "<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=137.118.84.204 dst=133.63.54.158 protocol=tcp sport=443 dport=24736 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "133.63.54.158",
"serverIP": "137.118.84.204"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=137.118.84.204 dst=133.63.54.158 protocol=tcp sport=443 dport=24736 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=137.118.84.204 dst=133.63.54.158 protocol=tcp sport=443 dport=24736 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 24736
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 133.63.54.158
serverIP: 137.118.84.204 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=138.122.63.10 dst=14.161.218.102 protocol=tcp sport=443 dport=24736 decision=blocked | {
"action": "block",
"clientport": 24736,
"message": "<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=138.122.63.10 dst=14.161.218.102 protocol=tcp sport=443 dport=24736 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "14.161.218.102",
"serverIP": "138.122.63.10"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=138.122.63.10 dst=14.161.218.102 protocol=tcp sport=443 dport=24736 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=138.122.63.10 dst=14.161.218.102 protocol=tcp sport=443 dport=24736 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 24736
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 14.161.218.102
serverIP: 138.122.63.10 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=69.9.56.139 dst=194.59.68.135 protocol=tcp sport=443 dport=24736 decision=blocked | {
"action": "block",
"clientport": 24736,
"message": "<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=69.9.56.139 dst=194.59.68.135 protocol=tcp sport=443 dport=24736 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "194.59.68.135",
"serverIP": "69.9.56.139"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=69.9.56.139 dst=194.59.68.135 protocol=tcp sport=443 dport=24736 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689971278.912805044 NORDC_MX400_1 l7_firewall src=69.9.56.139 dst=194.59.68.135 protocol=tcp sport=443 dport=24736 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 24736
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 194.59.68.135
serverIP: 69.9.56.139 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=215.242.177.0 dst=59.94.69.100 protocol=udp sport=56188 dport=53 decision=blocked | {
"action": "block",
"clientport": 56188,
"message": "<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=215.242.177.0 dst=59.94.69.100 protocol=udp sport=56188 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "215.242.177.0",
"serverIP": "59.94.69.100"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=215.242.177.0 dst=59.94.69.100 protocol=udp sport=56188 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=215.242.177.0 dst=59.94.69.100 protocol=udp sport=56188 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56188
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 215.242.177.0
serverIP: 59.94.69.100 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=200.181.155.20 dst=229.26.49.18 protocol=udp sport=56188 dport=53 decision=blocked | {
"action": "block",
"clientport": 56188,
"message": "<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=200.181.155.20 dst=229.26.49.18 protocol=udp sport=56188 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "200.181.155.20",
"serverIP": "229.26.49.18"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=200.181.155.20 dst=229.26.49.18 protocol=udp sport=56188 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=200.181.155.20 dst=229.26.49.18 protocol=udp sport=56188 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56188
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 200.181.155.20
serverIP: 229.26.49.18 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=151.185.36.2 dst=135.34.79.130 protocol=udp sport=56188 dport=53 decision=blocked | {
"action": "block",
"clientport": 56188,
"message": "<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=151.185.36.2 dst=135.34.79.130 protocol=udp sport=56188 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "151.185.36.2",
"serverIP": "135.34.79.130"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=151.185.36.2 dst=135.34.79.130 protocol=udp sport=56188 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=151.185.36.2 dst=135.34.79.130 protocol=udp sport=56188 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56188
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 151.185.36.2
serverIP: 135.34.79.130 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=237.250.70.196 dst=118.87.98.151 protocol=udp sport=56188 dport=53 decision=blocked | {
"action": "block",
"clientport": 56188,
"message": "<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=237.250.70.196 dst=118.87.98.151 protocol=udp sport=56188 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "237.250.70.196",
"serverIP": "118.87.98.151"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=237.250.70.196 dst=118.87.98.151 protocol=udp sport=56188 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1684430554.315411705 M52_MX67C_Loxley l7_firewall src=237.250.70.196 dst=118.87.98.151 protocol=udp sport=56188 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56188
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 237.250.70.196
serverIP: 118.87.98.151 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=132.197.65.141 dst=100.211.57.158 protocol=tcp sport=59675 dport=443 decision=blocked | {
"action": "block",
"clientport": 59675,
"message": "<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=132.197.65.141 dst=100.211.57.158 protocol=tcp sport=59675 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "132.197.65.141",
"serverIP": "100.211.57.158"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=132.197.65.141 dst=100.211.57.158 protocol=tcp sport=59675 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=132.197.65.141 dst=100.211.57.158 protocol=tcp sport=59675 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59675
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 132.197.65.141
serverIP: 100.211.57.158 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=4.105.123.123 dst=171.31.239.132 protocol=tcp sport=59675 dport=443 decision=blocked | {
"action": "block",
"clientport": 59675,
"message": "<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=4.105.123.123 dst=171.31.239.132 protocol=tcp sport=59675 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "4.105.123.123",
"serverIP": "171.31.239.132"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=4.105.123.123 dst=171.31.239.132 protocol=tcp sport=59675 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=4.105.123.123 dst=171.31.239.132 protocol=tcp sport=59675 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59675
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 4.105.123.123
serverIP: 171.31.239.132 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=142.188.231.74 dst=92.214.30.112 protocol=tcp sport=59675 dport=443 decision=blocked | {
"action": "block",
"clientport": 59675,
"message": "<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=142.188.231.74 dst=92.214.30.112 protocol=tcp sport=59675 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "142.188.231.74",
"serverIP": "92.214.30.112"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=142.188.231.74 dst=92.214.30.112 protocol=tcp sport=59675 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=142.188.231.74 dst=92.214.30.112 protocol=tcp sport=59675 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59675
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 142.188.231.74
serverIP: 92.214.30.112 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=3.103.68.12 dst=97.123.14.217 protocol=tcp sport=59675 dport=443 decision=blocked | {
"action": "block",
"clientport": 59675,
"message": "<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=3.103.68.12 dst=97.123.14.217 protocol=tcp sport=59675 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "3.103.68.12",
"serverIP": "97.123.14.217"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=3.103.68.12 dst=97.123.14.217 protocol=tcp sport=59675 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1684418524.749631150 NORDC_MX400_1 l7_firewall src=3.103.68.12 dst=97.123.14.217 protocol=tcp sport=59675 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59675
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 3.103.68.12
serverIP: 97.123.14.217 | Explain this syslog message |
<185>Jul 11 13:48:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=252.70.96.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=199.176.126.30 spt=43058 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jul 11 2023 13:48:03 rt=1689101283188 request=/aab8 requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=18946482f74-e5229125 cn2=43058 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=199.176.126.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 43058,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/aab8",
"localhostname": "WAFirewall",
"localstarttime": "1689101283188 ",
"message": "<185>Jul 11 13:48:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=252.70.96.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=199.176.126.30 spt=43058 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jul 11 2023 13:48:03 rt=1689101283188 request=/aab8 requestClientApplication=\"Mozilla/5.0 zgrab/0.x\" dvchost=WAFirewall externalId=18946482f74-e5229125 cn2=43058 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=199.176.126.30 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:170.64.130.197",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "199.176.126.30",
"serverIP": "252.70.96.224",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 11 13:48:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=252.70.96.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=199.176.126.30 spt=43058 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jul 11 2023 13:48:03 rt=1689101283188 request=/aab8 requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=18946482f74-e5229125 cn2=43058 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=199.176.126.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 11 13:48:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=252.70.96.224 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=199.176.126.30 spt=43058 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jul 11 2023 13:48:03 rt=1689101283188 request=/aab8 requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=18946482f74-e5229125 cn2=43058 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=199.176.126.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 43058
facilitycode: 23
facilitylabel: local7
fqdn: /aab8
localhostname: WAFirewall
localstarttime: 1689101283188
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:170.64.130.197', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 199.176.126.30
serverIP: 252.70.96.224
userName: - | Explain this syslog message |
<185>Jul 11 13:48:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=110.9.108.247 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=203.32.104.127 spt=43058 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jul 11 2023 13:48:03 rt=1689101283188 request=/aab8 requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=18946482f74-e5229125 cn2=43058 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=203.32.104.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 43058,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/aab8",
"localhostname": "WAFirewall",
"localstarttime": "1689101283188 ",
"message": "<185>Jul 11 13:48:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=110.9.108.247 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=203.32.104.127 spt=43058 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jul 11 2023 13:48:03 rt=1689101283188 request=/aab8 requestClientApplication=\"Mozilla/5.0 zgrab/0.x\" dvchost=WAFirewall externalId=18946482f74-e5229125 cn2=43058 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=203.32.104.127 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:170.64.130.197",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "203.32.104.127",
"serverIP": "110.9.108.247",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 11 13:48:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=110.9.108.247 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=203.32.104.127 spt=43058 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jul 11 2023 13:48:03 rt=1689101283188 request=/aab8 requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=18946482f74-e5229125 cn2=43058 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=203.32.104.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 11 13:48:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=110.9.108.247 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=203.32.104.127 spt=43058 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jul 11 2023 13:48:03 rt=1689101283188 request=/aab8 requestClientApplication="Mozilla/5.0 zgrab/0.x" dvchost=WAFirewall externalId=18946482f74-e5229125 cn2=43058 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=203.32.104.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 43058
facilitycode: 23
facilitylabel: local7
fqdn: /aab8
localhostname: WAFirewall
localstarttime: 1689101283188
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:170.64.130.197', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 203.32.104.127
serverIP: 110.9.108.247
userName: - | Explain this syslog message |
<185>Oct 8 23:59:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.140.110.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=60.19.231.140 spt=28273 requestMethod=GET app=HTTP requestContext="-" start=Oct 08 2023 23:59:13 rt=1696827553332 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=18b12cdb5f5-af885d37 cn2=28273 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=60.19.231.140 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 28273,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1696827553332 ",
"message": "<185>Oct 8 23:59:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.140.110.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=60.19.231.140 spt=28273 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 08 2023 23:59:13 rt=1696827553332 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=18b12cdb5f5-af885d37 cn2=28273 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=60.19.231.140 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:114.119.148.105",
"RuleID:global"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "60.19.231.140",
"serverIP": "96.140.110.124",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 8 23:59:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.140.110.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=60.19.231.140 spt=28273 requestMethod=GET app=HTTP requestContext="-" start=Oct 08 2023 23:59:13 rt=1696827553332 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=18b12cdb5f5-af885d37 cn2=28273 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=60.19.231.140 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 8 23:59:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.140.110.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=60.19.231.140 spt=28273 requestMethod=GET app=HTTP requestContext="-" start=Oct 08 2023 23:59:13 rt=1696827553332 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=18b12cdb5f5-af885d37 cn2=28273 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=60.19.231.140 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 28273
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1696827553332
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:114.119.148.105', 'RuleID:global']
vendorcode: 342
streamName: barracuda_waf
clientIP: 60.19.231.140
serverIP: 96.140.110.124
userName: - | Explain this syslog message |
<185>Oct 8 23:59:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=248.41.8.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.162.2.56 spt=28273 requestMethod=GET app=HTTP requestContext="-" start=Oct 08 2023 23:59:13 rt=1696827553332 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=18b12cdb5f5-af885d37 cn2=28273 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.162.2.56 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 28273,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1696827553332 ",
"message": "<185>Oct 8 23:59:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=248.41.8.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=248.162.2.56 spt=28273 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 08 2023 23:59:13 rt=1696827553332 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=18b12cdb5f5-af885d37 cn2=28273 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.162.2.56 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:114.119.148.105",
"RuleID:global"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "248.162.2.56",
"serverIP": "248.41.8.137",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 8 23:59:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=248.41.8.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.162.2.56 spt=28273 requestMethod=GET app=HTTP requestContext="-" start=Oct 08 2023 23:59:13 rt=1696827553332 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=18b12cdb5f5-af885d37 cn2=28273 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.162.2.56 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 8 23:59:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=248.41.8.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.162.2.56 spt=28273 requestMethod=GET app=HTTP requestContext="-" start=Oct 08 2023 23:59:13 rt=1696827553332 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=18b12cdb5f5-af885d37 cn2=28273 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.162.2.56 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 28273
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1696827553332
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:114.119.148.105', 'RuleID:global']
vendorcode: 342
streamName: barracuda_waf
clientIP: 248.162.2.56
serverIP: 248.41.8.137
userName: - | Explain this syslog message |
<185>Oct 8 23:59:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=215.160.163.213 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.15.56.46 spt=28273 requestMethod=GET app=HTTP requestContext="-" start=Oct 08 2023 23:59:13 rt=1696827553332 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=18b12cdb5f5-af885d37 cn2=28273 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.15.56.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 28273,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1696827553332 ",
"message": "<185>Oct 8 23:59:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=215.160.163.213 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=141.15.56.46 spt=28273 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 08 2023 23:59:13 rt=1696827553332 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=18b12cdb5f5-af885d37 cn2=28273 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.15.56.46 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:114.119.148.105",
"RuleID:global"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "141.15.56.46",
"serverIP": "215.160.163.213",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 8 23:59:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=215.160.163.213 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.15.56.46 spt=28273 requestMethod=GET app=HTTP requestContext="-" start=Oct 08 2023 23:59:13 rt=1696827553332 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=18b12cdb5f5-af885d37 cn2=28273 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.15.56.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 8 23:59:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=215.160.163.213 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=141.15.56.46 spt=28273 requestMethod=GET app=HTTP requestContext="-" start=Oct 08 2023 23:59:13 rt=1696827553332 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=18b12cdb5f5-af885d37 cn2=28273 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=141.15.56.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 28273
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1696827553332
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:114.119.148.105', 'RuleID:global']
vendorcode: 342
streamName: barracuda_waf
clientIP: 141.15.56.46
serverIP: 215.160.163.213
userName: - | Explain this syslog message |
<185>Aug 28 20:44:56 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=52.190.17.203 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.30.79.45 spt=55936 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 28 2022 20:44:56 rt=1661737496410 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=182e745ee34-b2cb733d cn2=55936 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.30.79.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:60.217.75.70",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 28 20:44:56 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=52.190.17.203 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=65.30.79.45 spt=55936 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 28 2022 20:44:56 rt=1661737496410 request=/ requestClientApplication=\"Mozilla/5.0\" dvchost=WAFirewall externalId=182e745ee34-b2cb733d cn2=55936 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.30.79.45 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661737496410 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 55936,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "65.30.79.45",
"serverIP": "52.190.17.203",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 28 20:44:56 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=52.190.17.203 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.30.79.45 spt=55936 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 28 2022 20:44:56 rt=1661737496410 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=182e745ee34-b2cb733d cn2=55936 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.30.79.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 28 20:44:56 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=52.190.17.203 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.30.79.45 spt=55936 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 28 2022 20:44:56 rt=1661737496410 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=182e745ee34-b2cb733d cn2=55936 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.30.79.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:60.217.75.70', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661737496410
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 55936
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 65.30.79.45
serverIP: 52.190.17.203
userName: - | Explain this syslog message |
<185>Aug 28 20:44:56 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=101.110.187.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=189.207.5.78 spt=55936 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 28 2022 20:44:56 rt=1661737496410 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=182e745ee34-b2cb733d cn2=55936 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.207.5.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:60.217.75.70",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 28 20:44:56 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=101.110.187.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=189.207.5.78 spt=55936 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 28 2022 20:44:56 rt=1661737496410 request=/ requestClientApplication=\"Mozilla/5.0\" dvchost=WAFirewall externalId=182e745ee34-b2cb733d cn2=55936 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.207.5.78 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661737496410 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 55936,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "189.207.5.78",
"serverIP": "101.110.187.168",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 28 20:44:56 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=101.110.187.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=189.207.5.78 spt=55936 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 28 2022 20:44:56 rt=1661737496410 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=182e745ee34-b2cb733d cn2=55936 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.207.5.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 28 20:44:56 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=101.110.187.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=189.207.5.78 spt=55936 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 28 2022 20:44:56 rt=1661737496410 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=182e745ee34-b2cb733d cn2=55936 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.207.5.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:60.217.75.70', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661737496410
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 55936
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 189.207.5.78
serverIP: 101.110.187.168
userName: - | Explain this syslog message |
<185>Aug 28 20:44:56 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=219.55.90.53 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=231.139.228.226 spt=55936 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 28 2022 20:44:56 rt=1661737496410 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=182e745ee34-b2cb733d cn2=55936 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.139.228.226 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:60.217.75.70",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 28 20:44:56 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=219.55.90.53 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=231.139.228.226 spt=55936 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 28 2022 20:44:56 rt=1661737496410 request=/ requestClientApplication=\"Mozilla/5.0\" dvchost=WAFirewall externalId=182e745ee34-b2cb733d cn2=55936 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.139.228.226 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661737496410 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 55936,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "231.139.228.226",
"serverIP": "219.55.90.53",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 28 20:44:56 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=219.55.90.53 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=231.139.228.226 spt=55936 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 28 2022 20:44:56 rt=1661737496410 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=182e745ee34-b2cb733d cn2=55936 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.139.228.226 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 28 20:44:56 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=219.55.90.53 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=231.139.228.226 spt=55936 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 28 2022 20:44:56 rt=1661737496410 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=182e745ee34-b2cb733d cn2=55936 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.139.228.226 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:60.217.75.70', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661737496410
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 55936
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 231.139.228.226
serverIP: 219.55.90.53
userName: - | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1662207742.507948955 NORDC_MX400_1 l7_firewall src=156.178.97.228 dst=45.233.209.180 protocol=tcp sport=8080 dport=65328 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1662207742.507948955 NORDC_MX400_1 l7_firewall src=156.178.97.228 dst=45.233.209.180 protocol=tcp sport=8080 dport=65328 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 65328,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "45.233.209.180",
"serverIP": "156.178.97.228"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1662207742.507948955 NORDC_MX400_1 l7_firewall src=156.178.97.228 dst=45.233.209.180 protocol=tcp sport=8080 dport=65328 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1662207742.507948955 NORDC_MX400_1 l7_firewall src=156.178.97.228 dst=45.233.209.180 protocol=tcp sport=8080 dport=65328 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 8080
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 65328
protocol: 6
streamName: meraki_l7_firewall
clientIP: 45.233.209.180
serverIP: 156.178.97.228 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1662207742.507948955 NORDC_MX400_1 l7_firewall src=201.79.149.49 dst=8.7.117.24 protocol=tcp sport=8080 dport=65328 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1662207742.507948955 NORDC_MX400_1 l7_firewall src=201.79.149.49 dst=8.7.117.24 protocol=tcp sport=8080 dport=65328 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 65328,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "8.7.117.24",
"serverIP": "201.79.149.49"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.