input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=49.40.30.214 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=155.245.214.147 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198158 request=/admin.jhtml requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0afce-c678a12 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.245.214.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 58034 facilitycode: 23 facilitylabel: local7 fqdn: /admin.jhtml localhostname: WAFirewall localstarttime: 1700399198158 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 155.245.214.147 serverIP: 49.40.30.214 userName: -
Explain this syslog message
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.128.142.92 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=178.65.132.40 spt=58572 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198793 request=/inicio.jsa requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b249-86068d7 cn2=58572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=178.65.132.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 58572, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/inicio.jsa", "localhostname": "WAFirewall", "localstarttime": "1700399198793 ", "message": "<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.128.142.92 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=178.65.132.40 spt=58572 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:38 rt=1700399198793 request=/inicio.jsa requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b0b249-86068d7 cn2=58572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=178.65.132.40 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "178.65.132.40", "serverIP": "111.128.142.92", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.128.142.92 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=178.65.132.40 spt=58572 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198793 request=/inicio.jsa requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b249-86068d7 cn2=58572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=178.65.132.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.128.142.92 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=178.65.132.40 spt=58572 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198793 request=/inicio.jsa requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b249-86068d7 cn2=58572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=178.65.132.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 58572 facilitycode: 23 facilitylabel: local7 fqdn: /inicio.jsa localhostname: WAFirewall localstarttime: 1700399198793 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 178.65.132.40 serverIP: 111.128.142.92 userName: -
Explain this syslog message
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=238.66.198.136 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=220.150.167.185 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198158 request=/admin.jhtml requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0afce-c678a12 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.150.167.185 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 58034, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/admin.jhtml", "localhostname": "WAFirewall", "localstarttime": "1700399198158 ", "message": "<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=238.66.198.136 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=220.150.167.185 spt=58034 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:38 rt=1700399198158 request=/admin.jhtml requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b0afce-c678a12 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.150.167.185 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "220.150.167.185", "serverIP": "238.66.198.136", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=238.66.198.136 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=220.150.167.185 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198158 request=/admin.jhtml requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0afce-c678a12 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.150.167.185 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=238.66.198.136 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=220.150.167.185 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198158 request=/admin.jhtml requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0afce-c678a12 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.150.167.185 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 58034 facilitycode: 23 facilitylabel: local7 fqdn: /admin.jhtml localhostname: WAFirewall localstarttime: 1700399198158 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 220.150.167.185 serverIP: 238.66.198.136 userName: -
Explain this syslog message
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.247.125.42 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=144.14.218.242 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.14.218.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59576, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/menu.pl", "localhostname": "WAFirewall", "localstarttime": "1700399200074 ", "message": "<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.247.125.42 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=144.14.218.242 spt=59576 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.14.218.242 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "144.14.218.242", "serverIP": "175.247.125.42", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.247.125.42 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=144.14.218.242 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.14.218.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.247.125.42 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=144.14.218.242 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.14.218.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59576 facilitycode: 23 facilitylabel: local7 fqdn: /menu.pl localhostname: WAFirewall localstarttime: 1700399200074 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 144.14.218.242 serverIP: 175.247.125.42 userName: -
Explain this syslog message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=52.0.42.65 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=170.185.150.211 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.185.150.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 54532, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/index.jsp", "localhostname": "WAFirewall", "localstarttime": "1700399193746 ", "message": "<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=52.0.42.65 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=170.185.150.211 spt=54532 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.185.150.211 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "170.185.150.211", "serverIP": "52.0.42.65", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=52.0.42.65 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=170.185.150.211 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.185.150.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=52.0.42.65 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=170.185.150.211 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.185.150.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 54532 facilitycode: 23 facilitylabel: local7 fqdn: /index.jsp localhostname: WAFirewall localstarttime: 1700399193746 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 170.185.150.211 serverIP: 52.0.42.65 userName: -
Explain this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.230.41.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=234.75.185.18 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.75.185.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52698, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/readme.txt", "localhostname": "WAFirewall", "localstarttime": "1700399191682 ", "message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.230.41.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=234.75.185.18 spt=52698 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.75.185.18 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "234.75.185.18", "serverIP": "42.230.41.252", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.230.41.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=234.75.185.18 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.75.185.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.230.41.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=234.75.185.18 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.75.185.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52698 facilitycode: 23 facilitylabel: local7 fqdn: /readme.txt localhostname: WAFirewall localstarttime: 1700399191682 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 234.75.185.18 serverIP: 42.230.41.252 userName: -
Explain this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.18.27.7 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=80.83.195.98 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=80.83.195.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52646, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1700399191633 ", "message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.18.27.7 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=80.83.195.98 spt=52646 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=80.83.195.98 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "80.83.195.98", "serverIP": "133.18.27.7", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.18.27.7 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=80.83.195.98 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=80.83.195.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.18.27.7 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=80.83.195.98 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=80.83.195.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52646 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1700399191633 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 80.83.195.98 serverIP: 133.18.27.7 userName: -
Explain this syslog message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=74.65.221.202 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=170.193.130.104 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.193.130.104 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52016, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/HNAP1", "localhostname": "WAFirewall", "localstarttime": "1700399190854 ", "message": "<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=74.65.221.202 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=170.193.130.104 spt=52016 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.193.130.104 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "170.193.130.104", "serverIP": "74.65.221.202", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=74.65.221.202 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=170.193.130.104 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.193.130.104 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=74.65.221.202 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=170.193.130.104 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.193.130.104 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52016 facilitycode: 23 facilitylabel: local7 fqdn: /HNAP1 localhostname: WAFirewall localstarttime: 1700399190854 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 170.193.130.104 serverIP: 74.65.221.202 userName: -
Explain this syslog message
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=115.19.103.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=22.142.91.169 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.142.91.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59576, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/menu.pl", "localhostname": "WAFirewall", "localstarttime": "1700399200074 ", "message": "<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=115.19.103.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=22.142.91.169 spt=59576 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.142.91.169 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "22.142.91.169", "serverIP": "115.19.103.125", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=115.19.103.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=22.142.91.169 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.142.91.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=115.19.103.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=22.142.91.169 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.142.91.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59576 facilitycode: 23 facilitylabel: local7 fqdn: /menu.pl localhostname: WAFirewall localstarttime: 1700399200074 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 22.142.91.169 serverIP: 115.19.103.125 userName: -
Explain this syslog message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=140.251.223.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=252.156.18.98 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.156.18.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 54532, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/index.jsp", "localhostname": "WAFirewall", "localstarttime": "1700399193746 ", "message": "<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=140.251.223.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=252.156.18.98 spt=54532 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.156.18.98 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "252.156.18.98", "serverIP": "140.251.223.46", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=140.251.223.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=252.156.18.98 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.156.18.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=140.251.223.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=252.156.18.98 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.156.18.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 54532 facilitycode: 23 facilitylabel: local7 fqdn: /index.jsp localhostname: WAFirewall localstarttime: 1700399193746 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 252.156.18.98 serverIP: 140.251.223.46 userName: -
Explain this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.90.120.190 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=94.190.22.16 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.190.22.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52698, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/readme.txt", "localhostname": "WAFirewall", "localstarttime": "1700399191682 ", "message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.90.120.190 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=94.190.22.16 spt=52698 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.190.22.16 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "94.190.22.16", "serverIP": "101.90.120.190", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.90.120.190 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=94.190.22.16 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.190.22.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.90.120.190 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=94.190.22.16 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.190.22.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52698 facilitycode: 23 facilitylabel: local7 fqdn: /readme.txt localhostname: WAFirewall localstarttime: 1700399191682 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 94.190.22.16 serverIP: 101.90.120.190 userName: -
Explain this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=12.203.109.137 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=30.75.88.76 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.75.88.76 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52646, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1700399191633 ", "message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=12.203.109.137 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=30.75.88.76 spt=52646 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.75.88.76 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "30.75.88.76", "serverIP": "12.203.109.137", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=12.203.109.137 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=30.75.88.76 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.75.88.76 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=12.203.109.137 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=30.75.88.76 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.75.88.76 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52646 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1700399191633 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 30.75.88.76 serverIP: 12.203.109.137 userName: -
Explain this syslog message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=123.101.134.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=105.96.14.129 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.96.14.129 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52016, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/HNAP1", "localhostname": "WAFirewall", "localstarttime": "1700399190854 ", "message": "<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=123.101.134.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=105.96.14.129 spt=52016 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.96.14.129 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "105.96.14.129", "serverIP": "123.101.134.110", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=123.101.134.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=105.96.14.129 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.96.14.129 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=123.101.134.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=105.96.14.129 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.96.14.129 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52016 facilitycode: 23 facilitylabel: local7 fqdn: /HNAP1 localhostname: WAFirewall localstarttime: 1700399190854 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 105.96.14.129 serverIP: 123.101.134.110 userName: -
Explain this syslog message
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.142.186.236 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=0.160.221.155 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.160.221.155 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59576, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/menu.pl", "localhostname": "WAFirewall", "localstarttime": "1700399200074 ", "message": "<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.142.186.236 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=0.160.221.155 spt=59576 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.160.221.155 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "0.160.221.155", "serverIP": "213.142.186.236", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.142.186.236 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=0.160.221.155 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.160.221.155 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.142.186.236 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=0.160.221.155 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.160.221.155 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59576 facilitycode: 23 facilitylabel: local7 fqdn: /menu.pl localhostname: WAFirewall localstarttime: 1700399200074 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 0.160.221.155 serverIP: 213.142.186.236 userName: -
Explain this syslog message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.229.229.59 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=234.197.96.193 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.197.96.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 54532, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/index.jsp", "localhostname": "WAFirewall", "localstarttime": "1700399193746 ", "message": "<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.229.229.59 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=234.197.96.193 spt=54532 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.197.96.193 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "234.197.96.193", "serverIP": "183.229.229.59", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.229.229.59 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=234.197.96.193 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.197.96.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.229.229.59 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=234.197.96.193 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.197.96.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 54532 facilitycode: 23 facilitylabel: local7 fqdn: /index.jsp localhostname: WAFirewall localstarttime: 1700399193746 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 234.197.96.193 serverIP: 183.229.229.59 userName: -
Explain this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=186.19.123.123 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=55.10.204.221 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.10.204.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52698, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/readme.txt", "localhostname": "WAFirewall", "localstarttime": "1700399191682 ", "message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=186.19.123.123 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=55.10.204.221 spt=52698 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.10.204.221 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "55.10.204.221", "serverIP": "186.19.123.123", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=186.19.123.123 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=55.10.204.221 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.10.204.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=186.19.123.123 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=55.10.204.221 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.10.204.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52698 facilitycode: 23 facilitylabel: local7 fqdn: /readme.txt localhostname: WAFirewall localstarttime: 1700399191682 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 55.10.204.221 serverIP: 186.19.123.123 userName: -
Explain this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.73.173.2 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=105.108.163.150 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.108.163.150 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52646, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1700399191633 ", "message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.73.173.2 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=105.108.163.150 spt=52646 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.108.163.150 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "105.108.163.150", "serverIP": "79.73.173.2", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.73.173.2 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=105.108.163.150 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.108.163.150 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.73.173.2 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=105.108.163.150 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.108.163.150 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52646 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1700399191633 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 105.108.163.150 serverIP: 79.73.173.2 userName: -
Explain this syslog message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.54.150.222 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=255.206.52.81 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.206.52.81 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52016, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/HNAP1", "localhostname": "WAFirewall", "localstarttime": "1700399190854 ", "message": "<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.54.150.222 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=255.206.52.81 spt=52016 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.206.52.81 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "255.206.52.81", "serverIP": "106.54.150.222", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.54.150.222 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=255.206.52.81 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.206.52.81 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.54.150.222 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=255.206.52.81 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.206.52.81 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52016 facilitycode: 23 facilitylabel: local7 fqdn: /HNAP1 localhostname: WAFirewall localstarttime: 1700399190854 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 255.206.52.81 serverIP: 106.54.150.222 userName: -
Explain this syslog message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.245.90.113 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=13.130.215.233 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.130.215.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 54254, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/main.asp", "localhostname": "WAFirewall", "localstarttime": "1700399193430 ", "message": "<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.245.90.113 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=13.130.215.233 spt=54254 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.130.215.233 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "13.130.215.233", "serverIP": "15.245.90.113", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.245.90.113 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=13.130.215.233 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.130.215.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.245.90.113 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=13.130.215.233 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.130.215.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 54254 facilitycode: 23 facilitylabel: local7 fqdn: /main.asp localhostname: WAFirewall localstarttime: 1700399193430 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 13.130.215.233 serverIP: 15.245.90.113 userName: -
Explain this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=93.31.249.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=160.109.21.201 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=160.109.21.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52288, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1700399191270 ", "message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=93.31.249.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=160.109.21.201 spt=52288 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=160.109.21.201 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "160.109.21.201", "serverIP": "93.31.249.46", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=93.31.249.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=160.109.21.201 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=160.109.21.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=93.31.249.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=160.109.21.201 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=160.109.21.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52288 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1700399191270 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 160.109.21.201 serverIP: 93.31.249.46 userName: -
Explain this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.219.174.244 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=25.59.172.70 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.59.172.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52110, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/localstart.html", "localhostname": "WAFirewall", "localstarttime": "1700399191005 ", "message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.219.174.244 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=25.59.172.70 spt=52110 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.59.172.70 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "25.59.172.70", "serverIP": "40.219.174.244", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.219.174.244 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=25.59.172.70 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.59.172.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.219.174.244 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=25.59.172.70 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.59.172.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52110 facilitycode: 23 facilitylabel: local7 fqdn: /localstart.html localhostname: WAFirewall localstarttime: 1700399191005 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 25.59.172.70 serverIP: 40.219.174.244 userName: -
Explain this syslog message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.19.170.159 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=17.1.58.35 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.1.58.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 51864, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/Portal0000.htm", "localhostname": "WAFirewall", "localstarttime": "1700399190656 ", "message": "<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.19.170.159 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=17.1.58.35 spt=51864 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.1.58.35 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "17.1.58.35", "serverIP": "239.19.170.159", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.19.170.159 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=17.1.58.35 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.1.58.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.19.170.159 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=17.1.58.35 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.1.58.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 51864 facilitycode: 23 facilitylabel: local7 fqdn: /Portal0000.htm localhostname: WAFirewall localstarttime: 1700399190656 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 17.1.58.35 serverIP: 239.19.170.159 userName: -
Explain this syslog message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.127.163.64 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=128.203.21.65 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=128.203.21.65 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 54254, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/main.asp", "localhostname": "WAFirewall", "localstarttime": "1700399193430 ", "message": "<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.127.163.64 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=128.203.21.65 spt=54254 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=128.203.21.65 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "128.203.21.65", "serverIP": "147.127.163.64", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.127.163.64 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=128.203.21.65 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=128.203.21.65 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.127.163.64 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=128.203.21.65 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=128.203.21.65 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 54254 facilitycode: 23 facilitylabel: local7 fqdn: /main.asp localhostname: WAFirewall localstarttime: 1700399193430 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 128.203.21.65 serverIP: 147.127.163.64 userName: -
Explain this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=157.9.208.223 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=238.44.97.62 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=238.44.97.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52288, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1700399191270 ", "message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=157.9.208.223 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=238.44.97.62 spt=52288 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=238.44.97.62 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "238.44.97.62", "serverIP": "157.9.208.223", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=157.9.208.223 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=238.44.97.62 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=238.44.97.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=157.9.208.223 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=238.44.97.62 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=238.44.97.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52288 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1700399191270 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 238.44.97.62 serverIP: 157.9.208.223 userName: -
Explain this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.228.186.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=242.181.187.154 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.181.187.154 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52110, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/localstart.html", "localhostname": "WAFirewall", "localstarttime": "1700399191005 ", "message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.228.186.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=242.181.187.154 spt=52110 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.181.187.154 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "242.181.187.154", "serverIP": "220.228.186.125", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.228.186.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=242.181.187.154 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.181.187.154 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.228.186.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=242.181.187.154 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.181.187.154 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52110 facilitycode: 23 facilitylabel: local7 fqdn: /localstart.html localhostname: WAFirewall localstarttime: 1700399191005 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 242.181.187.154 serverIP: 220.228.186.125 userName: -
Explain this syslog message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.141.85.54 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=163.129.51.40 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.129.51.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 51864, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/Portal0000.htm", "localhostname": "WAFirewall", "localstarttime": "1700399190656 ", "message": "<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.141.85.54 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=163.129.51.40 spt=51864 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.129.51.40 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "163.129.51.40", "serverIP": "94.141.85.54", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.141.85.54 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=163.129.51.40 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.129.51.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.141.85.54 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=163.129.51.40 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.129.51.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 51864 facilitycode: 23 facilitylabel: local7 fqdn: /Portal0000.htm localhostname: WAFirewall localstarttime: 1700399190656 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 163.129.51.40 serverIP: 94.141.85.54 userName: -
Explain this syslog message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=248.35.99.131 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=71.153.16.204 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.153.16.204 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 54254, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/main.asp", "localhostname": "WAFirewall", "localstarttime": "1700399193430 ", "message": "<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=248.35.99.131 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=71.153.16.204 spt=54254 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.153.16.204 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "71.153.16.204", "serverIP": "248.35.99.131", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=248.35.99.131 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=71.153.16.204 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.153.16.204 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=248.35.99.131 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=71.153.16.204 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.153.16.204 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 54254 facilitycode: 23 facilitylabel: local7 fqdn: /main.asp localhostname: WAFirewall localstarttime: 1700399193430 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 71.153.16.204 serverIP: 248.35.99.131 userName: -
Explain this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=178.137.236.66 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=77.144.92.105 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.144.92.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52288, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1700399191270 ", "message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=178.137.236.66 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=77.144.92.105 spt=52288 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.144.92.105 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "77.144.92.105", "serverIP": "178.137.236.66", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=178.137.236.66 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=77.144.92.105 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.144.92.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=178.137.236.66 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=77.144.92.105 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.144.92.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52288 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1700399191270 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 77.144.92.105 serverIP: 178.137.236.66 userName: -
Explain this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=84.134.114.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=18.26.237.199 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=18.26.237.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 52110, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/localstart.html", "localhostname": "WAFirewall", "localstarttime": "1700399191005 ", "message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=84.134.114.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=18.26.237.199 spt=52110 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=18.26.237.199 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "18.26.237.199", "serverIP": "84.134.114.110", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=84.134.114.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=18.26.237.199 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=18.26.237.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=84.134.114.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=18.26.237.199 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=18.26.237.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 52110 facilitycode: 23 facilitylabel: local7 fqdn: /localstart.html localhostname: WAFirewall localstarttime: 1700399191005 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 18.26.237.199 serverIP: 84.134.114.110 userName: -
Explain this syslog message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.163.171.249 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=58.22.199.53 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.22.199.53 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 51864, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/Portal0000.htm", "localhostname": "WAFirewall", "localstarttime": "1700399190656 ", "message": "<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.163.171.249 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=58.22.199.53 spt=51864 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.22.199.53 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "58.22.199.53", "serverIP": "94.163.171.249", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.163.171.249 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=58.22.199.53 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.22.199.53 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.163.171.249 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=58.22.199.53 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.22.199.53 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 51864 facilitycode: 23 facilitylabel: local7 fqdn: /Portal0000.htm localhostname: WAFirewall localstarttime: 1700399190656 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 58.22.199.53 serverIP: 94.163.171.249 userName: -
Explain this syslog message
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=252.69.155.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=113.239.213.203 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.239.213.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 41600, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1700399181903 ", "message": "<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=252.69.155.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=113.239.213.203 spt=41600 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.239.213.203 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "113.239.213.203", "serverIP": "252.69.155.252", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=252.69.155.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=113.239.213.203 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.239.213.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=252.69.155.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=113.239.213.203 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.239.213.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 41600 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1700399181903 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 113.239.213.203 serverIP: 252.69.155.252 userName: -
Explain this syslog message
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=150.242.182.35 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=167.3.212.239 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.3.212.239 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 41600, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1700399181903 ", "message": "<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=150.242.182.35 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=167.3.212.239 spt=41600 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.3.212.239 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "167.3.212.239", "serverIP": "150.242.182.35", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=150.242.182.35 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=167.3.212.239 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.3.212.239 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=150.242.182.35 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=167.3.212.239 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.3.212.239 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 41600 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1700399181903 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 167.3.212.239 serverIP: 150.242.182.35 userName: -
Explain this syslog message
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.32.139.47 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=131.52.184.16 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.52.184.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 41600, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1700399181903 ", "message": "<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.32.139.47 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=131.52.184.16 spt=41600 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.52.184.16 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:172.104.4.17", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "131.52.184.16", "serverIP": "159.32.139.47", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.32.139.47 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=131.52.184.16 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.52.184.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.32.139.47 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=131.52.184.16 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.52.184.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 41600 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1700399181903 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 131.52.184.16 serverIP: 159.32.139.47 userName: -
Explain this syslog message
<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=103.56.134.130 dpt=80 act=DENY msg=["-"] duser="-" src=130.7.45.70 spt=50192 requestMethod="-" app=HTTP requestContext="-" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.7.45.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 50192, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1700399188231 ", "message": "<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=103.56.134.130 dpt=80 act=DENY msg=[\"-\"] duser=\"-\" src=130.7.45.70 spt=50192 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.7.45.70 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "ProxyIP:172.104.4.17", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "130.7.45.70", "serverIP": "103.56.134.130", "userName": "-" }
Create a JSON artifact from the message
<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=103.56.134.130 dpt=80 act=DENY msg=["-"] duser="-" src=130.7.45.70 spt=50192 requestMethod="-" app=HTTP requestContext="-" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.7.45.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=103.56.134.130 dpt=80 act=DENY msg=["-"] duser="-" src=130.7.45.70 spt=50192 requestMethod="-" app=HTTP requestContext="-" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.7.45.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 50192 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1700399188231 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'ProxyIP:172.104.4.17', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 130.7.45.70 serverIP: 103.56.134.130 userName: -
Explain this syslog message