input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=49.40.30.214 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=155.245.214.147 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198158 request=/admin.jhtml requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0afce-c678a12 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.245.214.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 58034
facilitycode: 23
facilitylabel: local7
fqdn: /admin.jhtml
localhostname: WAFirewall
localstarttime: 1700399198158
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 155.245.214.147
serverIP: 49.40.30.214
userName: - | Explain this syslog message |
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.128.142.92 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=178.65.132.40 spt=58572 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198793 request=/inicio.jsa requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b249-86068d7 cn2=58572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=178.65.132.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 58572,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/inicio.jsa",
"localhostname": "WAFirewall",
"localstarttime": "1700399198793 ",
"message": "<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.128.142.92 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=178.65.132.40 spt=58572 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:38 rt=1700399198793 request=/inicio.jsa requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b0b249-86068d7 cn2=58572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=178.65.132.40 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "178.65.132.40",
"serverIP": "111.128.142.92",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.128.142.92 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=178.65.132.40 spt=58572 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198793 request=/inicio.jsa requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b249-86068d7 cn2=58572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=178.65.132.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.128.142.92 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=178.65.132.40 spt=58572 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198793 request=/inicio.jsa requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b249-86068d7 cn2=58572 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=178.65.132.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 58572
facilitycode: 23
facilitylabel: local7
fqdn: /inicio.jsa
localhostname: WAFirewall
localstarttime: 1700399198793
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 178.65.132.40
serverIP: 111.128.142.92
userName: - | Explain this syslog message |
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=238.66.198.136 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=220.150.167.185 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198158 request=/admin.jhtml requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0afce-c678a12 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.150.167.185 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 58034,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/admin.jhtml",
"localhostname": "WAFirewall",
"localstarttime": "1700399198158 ",
"message": "<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=238.66.198.136 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=220.150.167.185 spt=58034 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:38 rt=1700399198158 request=/admin.jhtml requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b0afce-c678a12 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.150.167.185 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "220.150.167.185",
"serverIP": "238.66.198.136",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=238.66.198.136 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=220.150.167.185 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198158 request=/admin.jhtml requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0afce-c678a12 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.150.167.185 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=238.66.198.136 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=220.150.167.185 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:38 rt=1700399198158 request=/admin.jhtml requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0afce-c678a12 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.150.167.185 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 58034
facilitycode: 23
facilitylabel: local7
fqdn: /admin.jhtml
localhostname: WAFirewall
localstarttime: 1700399198158
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 220.150.167.185
serverIP: 238.66.198.136
userName: - | Explain this syslog message |
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.247.125.42 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=144.14.218.242 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.14.218.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59576,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/menu.pl",
"localhostname": "WAFirewall",
"localstarttime": "1700399200074 ",
"message": "<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.247.125.42 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=144.14.218.242 spt=59576 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.14.218.242 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "144.14.218.242",
"serverIP": "175.247.125.42",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.247.125.42 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=144.14.218.242 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.14.218.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.247.125.42 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=144.14.218.242 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.14.218.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59576
facilitycode: 23
facilitylabel: local7
fqdn: /menu.pl
localhostname: WAFirewall
localstarttime: 1700399200074
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 144.14.218.242
serverIP: 175.247.125.42
userName: - | Explain this syslog message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=52.0.42.65 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=170.185.150.211 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.185.150.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54532,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/index.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1700399193746 ",
"message": "<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=52.0.42.65 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=170.185.150.211 spt=54532 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.185.150.211 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "170.185.150.211",
"serverIP": "52.0.42.65",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=52.0.42.65 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=170.185.150.211 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.185.150.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=52.0.42.65 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=170.185.150.211 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.185.150.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54532
facilitycode: 23
facilitylabel: local7
fqdn: /index.jsp
localhostname: WAFirewall
localstarttime: 1700399193746
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 170.185.150.211
serverIP: 52.0.42.65
userName: - | Explain this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.230.41.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=234.75.185.18 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.75.185.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52698,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/readme.txt",
"localhostname": "WAFirewall",
"localstarttime": "1700399191682 ",
"message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.230.41.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=234.75.185.18 spt=52698 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.75.185.18 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "234.75.185.18",
"serverIP": "42.230.41.252",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.230.41.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=234.75.185.18 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.75.185.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.230.41.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=234.75.185.18 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.75.185.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52698
facilitycode: 23
facilitylabel: local7
fqdn: /readme.txt
localhostname: WAFirewall
localstarttime: 1700399191682
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 234.75.185.18
serverIP: 42.230.41.252
userName: - | Explain this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.18.27.7 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=80.83.195.98 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=80.83.195.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52646,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700399191633 ",
"message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.18.27.7 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=80.83.195.98 spt=52646 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=80.83.195.98 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "80.83.195.98",
"serverIP": "133.18.27.7",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.18.27.7 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=80.83.195.98 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=80.83.195.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=133.18.27.7 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=80.83.195.98 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=80.83.195.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52646
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700399191633
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 80.83.195.98
serverIP: 133.18.27.7
userName: - | Explain this syslog message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=74.65.221.202 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=170.193.130.104 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.193.130.104 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52016,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/HNAP1",
"localhostname": "WAFirewall",
"localstarttime": "1700399190854 ",
"message": "<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=74.65.221.202 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=170.193.130.104 spt=52016 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.193.130.104 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "170.193.130.104",
"serverIP": "74.65.221.202",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=74.65.221.202 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=170.193.130.104 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.193.130.104 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=74.65.221.202 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=170.193.130.104 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=170.193.130.104 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52016
facilitycode: 23
facilitylabel: local7
fqdn: /HNAP1
localhostname: WAFirewall
localstarttime: 1700399190854
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 170.193.130.104
serverIP: 74.65.221.202
userName: - | Explain this syslog message |
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=115.19.103.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=22.142.91.169 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.142.91.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59576,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/menu.pl",
"localhostname": "WAFirewall",
"localstarttime": "1700399200074 ",
"message": "<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=115.19.103.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=22.142.91.169 spt=59576 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.142.91.169 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "22.142.91.169",
"serverIP": "115.19.103.125",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=115.19.103.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=22.142.91.169 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.142.91.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=115.19.103.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=22.142.91.169 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.142.91.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59576
facilitycode: 23
facilitylabel: local7
fqdn: /menu.pl
localhostname: WAFirewall
localstarttime: 1700399200074
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 22.142.91.169
serverIP: 115.19.103.125
userName: - | Explain this syslog message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=140.251.223.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=252.156.18.98 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.156.18.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54532,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/index.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1700399193746 ",
"message": "<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=140.251.223.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=252.156.18.98 spt=54532 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.156.18.98 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "252.156.18.98",
"serverIP": "140.251.223.46",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=140.251.223.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=252.156.18.98 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.156.18.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=140.251.223.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=252.156.18.98 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.156.18.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54532
facilitycode: 23
facilitylabel: local7
fqdn: /index.jsp
localhostname: WAFirewall
localstarttime: 1700399193746
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 252.156.18.98
serverIP: 140.251.223.46
userName: - | Explain this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.90.120.190 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=94.190.22.16 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.190.22.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52698,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/readme.txt",
"localhostname": "WAFirewall",
"localstarttime": "1700399191682 ",
"message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.90.120.190 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=94.190.22.16 spt=52698 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.190.22.16 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "94.190.22.16",
"serverIP": "101.90.120.190",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.90.120.190 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=94.190.22.16 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.190.22.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.90.120.190 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=94.190.22.16 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.190.22.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52698
facilitycode: 23
facilitylabel: local7
fqdn: /readme.txt
localhostname: WAFirewall
localstarttime: 1700399191682
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 94.190.22.16
serverIP: 101.90.120.190
userName: - | Explain this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=12.203.109.137 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=30.75.88.76 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.75.88.76 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52646,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700399191633 ",
"message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=12.203.109.137 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=30.75.88.76 spt=52646 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.75.88.76 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "30.75.88.76",
"serverIP": "12.203.109.137",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=12.203.109.137 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=30.75.88.76 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.75.88.76 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=12.203.109.137 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=30.75.88.76 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.75.88.76 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52646
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700399191633
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 30.75.88.76
serverIP: 12.203.109.137
userName: - | Explain this syslog message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=123.101.134.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=105.96.14.129 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.96.14.129 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52016,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/HNAP1",
"localhostname": "WAFirewall",
"localstarttime": "1700399190854 ",
"message": "<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=123.101.134.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=105.96.14.129 spt=52016 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.96.14.129 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "105.96.14.129",
"serverIP": "123.101.134.110",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=123.101.134.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=105.96.14.129 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.96.14.129 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=123.101.134.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=105.96.14.129 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.96.14.129 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52016
facilitycode: 23
facilitylabel: local7
fqdn: /HNAP1
localhostname: WAFirewall
localstarttime: 1700399190854
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 105.96.14.129
serverIP: 123.101.134.110
userName: - | Explain this syslog message |
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.142.186.236 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=0.160.221.155 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.160.221.155 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59576,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/menu.pl",
"localhostname": "WAFirewall",
"localstarttime": "1700399200074 ",
"message": "<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.142.186.236 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=0.160.221.155 spt=59576 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.160.221.155 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "0.160.221.155",
"serverIP": "213.142.186.236",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.142.186.236 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=0.160.221.155 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.160.221.155 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=213.142.186.236 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=0.160.221.155 spt=59576 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:40 rt=1700399200074 request=/menu.pl requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b0b749-a6375f4 cn2=59576 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.160.221.155 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59576
facilitycode: 23
facilitylabel: local7
fqdn: /menu.pl
localhostname: WAFirewall
localstarttime: 1700399200074
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 0.160.221.155
serverIP: 213.142.186.236
userName: - | Explain this syslog message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.229.229.59 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=234.197.96.193 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.197.96.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54532,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/index.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1700399193746 ",
"message": "<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.229.229.59 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=234.197.96.193 spt=54532 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.197.96.193 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "234.197.96.193",
"serverIP": "183.229.229.59",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.229.229.59 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=234.197.96.193 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.197.96.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.229.229.59 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=234.197.96.193 spt=54532 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193746 request=/index.jsp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09e92-f93905ab cn2=54532 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.197.96.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54532
facilitycode: 23
facilitylabel: local7
fqdn: /index.jsp
localhostname: WAFirewall
localstarttime: 1700399193746
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 234.197.96.193
serverIP: 183.229.229.59
userName: - | Explain this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=186.19.123.123 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=55.10.204.221 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.10.204.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52698,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/readme.txt",
"localhostname": "WAFirewall",
"localstarttime": "1700399191682 ",
"message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=186.19.123.123 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=55.10.204.221 spt=52698 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.10.204.221 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "55.10.204.221",
"serverIP": "186.19.123.123",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=186.19.123.123 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=55.10.204.221 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.10.204.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=186.19.123.123 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=55.10.204.221 spt=52698 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191682 request=/readme.txt requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09682-5604cdb cn2=52698 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.10.204.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52698
facilitycode: 23
facilitylabel: local7
fqdn: /readme.txt
localhostname: WAFirewall
localstarttime: 1700399191682
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 55.10.204.221
serverIP: 186.19.123.123
userName: - | Explain this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.73.173.2 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=105.108.163.150 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.108.163.150 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52646,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700399191633 ",
"message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.73.173.2 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=105.108.163.150 spt=52646 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.108.163.150 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "105.108.163.150",
"serverIP": "79.73.173.2",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.73.173.2 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=105.108.163.150 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.108.163.150 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.73.173.2 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=105.108.163.150 spt=52646 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191633 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09651-db531f58 cn2=52646 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=105.108.163.150 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52646
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700399191633
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 105.108.163.150
serverIP: 79.73.173.2
userName: - | Explain this syslog message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.54.150.222 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=255.206.52.81 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.206.52.81 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52016,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/HNAP1",
"localhostname": "WAFirewall",
"localstarttime": "1700399190854 ",
"message": "<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.54.150.222 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=255.206.52.81 spt=52016 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.206.52.81 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "255.206.52.81",
"serverIP": "106.54.150.222",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.54.150.222 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=255.206.52.81 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.206.52.81 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.54.150.222 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=255.206.52.81 spt=52016 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190854 request=/HNAP1 requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09346-36438f7 cn2=52016 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.206.52.81 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52016
facilitycode: 23
facilitylabel: local7
fqdn: /HNAP1
localhostname: WAFirewall
localstarttime: 1700399190854
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 255.206.52.81
serverIP: 106.54.150.222
userName: - | Explain this syslog message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.245.90.113 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=13.130.215.233 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.130.215.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54254,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/main.asp",
"localhostname": "WAFirewall",
"localstarttime": "1700399193430 ",
"message": "<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.245.90.113 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=13.130.215.233 spt=54254 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.130.215.233 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "13.130.215.233",
"serverIP": "15.245.90.113",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.245.90.113 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=13.130.215.233 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.130.215.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.245.90.113 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=13.130.215.233 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=13.130.215.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54254
facilitycode: 23
facilitylabel: local7
fqdn: /main.asp
localhostname: WAFirewall
localstarttime: 1700399193430
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 13.130.215.233
serverIP: 15.245.90.113
userName: - | Explain this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=93.31.249.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=160.109.21.201 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=160.109.21.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52288,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700399191270 ",
"message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=93.31.249.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=160.109.21.201 spt=52288 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=160.109.21.201 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "160.109.21.201",
"serverIP": "93.31.249.46",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=93.31.249.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=160.109.21.201 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=160.109.21.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=93.31.249.46 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=160.109.21.201 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=160.109.21.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52288
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700399191270
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 160.109.21.201
serverIP: 93.31.249.46
userName: - | Explain this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.219.174.244 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=25.59.172.70 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.59.172.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52110,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/localstart.html",
"localhostname": "WAFirewall",
"localstarttime": "1700399191005 ",
"message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.219.174.244 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=25.59.172.70 spt=52110 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.59.172.70 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "25.59.172.70",
"serverIP": "40.219.174.244",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.219.174.244 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=25.59.172.70 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.59.172.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=40.219.174.244 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=25.59.172.70 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.59.172.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52110
facilitycode: 23
facilitylabel: local7
fqdn: /localstart.html
localhostname: WAFirewall
localstarttime: 1700399191005
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 25.59.172.70
serverIP: 40.219.174.244
userName: - | Explain this syslog message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.19.170.159 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=17.1.58.35 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.1.58.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 51864,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/Portal0000.htm",
"localhostname": "WAFirewall",
"localstarttime": "1700399190656 ",
"message": "<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.19.170.159 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=17.1.58.35 spt=51864 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.1.58.35 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "17.1.58.35",
"serverIP": "239.19.170.159",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.19.170.159 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=17.1.58.35 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.1.58.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.19.170.159 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=17.1.58.35 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.1.58.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 51864
facilitycode: 23
facilitylabel: local7
fqdn: /Portal0000.htm
localhostname: WAFirewall
localstarttime: 1700399190656
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 17.1.58.35
serverIP: 239.19.170.159
userName: - | Explain this syslog message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.127.163.64 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=128.203.21.65 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=128.203.21.65 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54254,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/main.asp",
"localhostname": "WAFirewall",
"localstarttime": "1700399193430 ",
"message": "<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.127.163.64 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=128.203.21.65 spt=54254 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=128.203.21.65 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "128.203.21.65",
"serverIP": "147.127.163.64",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.127.163.64 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=128.203.21.65 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=128.203.21.65 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=147.127.163.64 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=128.203.21.65 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=128.203.21.65 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54254
facilitycode: 23
facilitylabel: local7
fqdn: /main.asp
localhostname: WAFirewall
localstarttime: 1700399193430
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 128.203.21.65
serverIP: 147.127.163.64
userName: - | Explain this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=157.9.208.223 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=238.44.97.62 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=238.44.97.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52288,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700399191270 ",
"message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=157.9.208.223 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=238.44.97.62 spt=52288 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=238.44.97.62 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "238.44.97.62",
"serverIP": "157.9.208.223",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=157.9.208.223 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=238.44.97.62 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=238.44.97.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=157.9.208.223 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=238.44.97.62 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=238.44.97.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52288
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700399191270
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 238.44.97.62
serverIP: 157.9.208.223
userName: - | Explain this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.228.186.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=242.181.187.154 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.181.187.154 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52110,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/localstart.html",
"localhostname": "WAFirewall",
"localstarttime": "1700399191005 ",
"message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.228.186.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=242.181.187.154 spt=52110 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.181.187.154 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "242.181.187.154",
"serverIP": "220.228.186.125",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.228.186.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=242.181.187.154 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.181.187.154 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=220.228.186.125 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=242.181.187.154 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.181.187.154 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52110
facilitycode: 23
facilitylabel: local7
fqdn: /localstart.html
localhostname: WAFirewall
localstarttime: 1700399191005
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 242.181.187.154
serverIP: 220.228.186.125
userName: - | Explain this syslog message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.141.85.54 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=163.129.51.40 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.129.51.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 51864,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/Portal0000.htm",
"localhostname": "WAFirewall",
"localstarttime": "1700399190656 ",
"message": "<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.141.85.54 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=163.129.51.40 spt=51864 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.129.51.40 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "163.129.51.40",
"serverIP": "94.141.85.54",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.141.85.54 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=163.129.51.40 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.129.51.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.141.85.54 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=163.129.51.40 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.129.51.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 51864
facilitycode: 23
facilitylabel: local7
fqdn: /Portal0000.htm
localhostname: WAFirewall
localstarttime: 1700399190656
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 163.129.51.40
serverIP: 94.141.85.54
userName: - | Explain this syslog message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=248.35.99.131 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=71.153.16.204 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.153.16.204 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54254,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/main.asp",
"localhostname": "WAFirewall",
"localstarttime": "1700399193430 ",
"message": "<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=248.35.99.131 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=71.153.16.204 spt=54254 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.153.16.204 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "71.153.16.204",
"serverIP": "248.35.99.131",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=248.35.99.131 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=71.153.16.204 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.153.16.204 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=248.35.99.131 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=71.153.16.204 spt=54254 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:33 rt=1700399193430 request=/main.asp requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09d56-d5d8fbe cn2=54254 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.153.16.204 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54254
facilitycode: 23
facilitylabel: local7
fqdn: /main.asp
localhostname: WAFirewall
localstarttime: 1700399193430
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 71.153.16.204
serverIP: 248.35.99.131
userName: - | Explain this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=178.137.236.66 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=77.144.92.105 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.144.92.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52288,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700399191270 ",
"message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=178.137.236.66 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=77.144.92.105 spt=52288 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.144.92.105 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "77.144.92.105",
"serverIP": "178.137.236.66",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=178.137.236.66 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=77.144.92.105 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.144.92.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=178.137.236.66 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=77.144.92.105 spt=52288 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191270 request=/ requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b094e6-dd5f27bc cn2=52288 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.144.92.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52288
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700399191270
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 77.144.92.105
serverIP: 178.137.236.66
userName: - | Explain this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=84.134.114.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=18.26.237.199 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=18.26.237.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52110,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/localstart.html",
"localhostname": "WAFirewall",
"localstarttime": "1700399191005 ",
"message": "<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=84.134.114.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=18.26.237.199 spt=52110 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=18.26.237.199 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "18.26.237.199",
"serverIP": "84.134.114.110",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=84.134.114.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=18.26.237.199 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=18.26.237.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:31 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=84.134.114.110 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=18.26.237.199 spt=52110 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:31 rt=1700399191005 request=/localstart.html requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b093dd-dc5c23a4 cn2=52110 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=18.26.237.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52110
facilitycode: 23
facilitylabel: local7
fqdn: /localstart.html
localhostname: WAFirewall
localstarttime: 1700399191005
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 18.26.237.199
serverIP: 84.134.114.110
userName: - | Explain this syslog message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.163.171.249 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=58.22.199.53 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.22.199.53 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 51864,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/Portal0000.htm",
"localhostname": "WAFirewall",
"localstarttime": "1700399190656 ",
"message": "<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.163.171.249 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=58.22.199.53 spt=51864 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication=\"curl/7.54.0\" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.22.199.53 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "58.22.199.53",
"serverIP": "94.163.171.249",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.163.171.249 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=58.22.199.53 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.22.199.53 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:30 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=94.163.171.249 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=58.22.199.53 spt=51864 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:30 rt=1700399190656 request=/Portal0000.htm requestClientApplication="curl/7.54.0" dvchost=WAFirewall externalId=18be7b09280-d75bf79e cn2=51864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=58.22.199.53 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 51864
facilitycode: 23
facilitylabel: local7
fqdn: /Portal0000.htm
localhostname: WAFirewall
localstarttime: 1700399190656
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 58.22.199.53
serverIP: 94.163.171.249
userName: - | Explain this syslog message |
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=252.69.155.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=113.239.213.203 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.239.213.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41600,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700399181903 ",
"message": "<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=252.69.155.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=113.239.213.203 spt=41600 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.239.213.203 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "113.239.213.203",
"serverIP": "252.69.155.252",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=252.69.155.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=113.239.213.203 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.239.213.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=252.69.155.252 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=113.239.213.203 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=113.239.213.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41600
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700399181903
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 113.239.213.203
serverIP: 252.69.155.252
userName: - | Explain this syslog message |
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=150.242.182.35 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=167.3.212.239 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.3.212.239 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41600,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700399181903 ",
"message": "<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=150.242.182.35 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=167.3.212.239 spt=41600 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.3.212.239 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "167.3.212.239",
"serverIP": "150.242.182.35",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=150.242.182.35 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=167.3.212.239 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.3.212.239 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=150.242.182.35 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=167.3.212.239 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=167.3.212.239 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41600
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700399181903
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 167.3.212.239
serverIP: 150.242.182.35
userName: - | Explain this syslog message |
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.32.139.47 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=131.52.184.16 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.52.184.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41600,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700399181903 ",
"message": "<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.32.139.47 dpt=80 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=131.52.184.16 spt=41600 requestMethod=GET app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.52.184.16 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:172.104.4.17",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "131.52.184.16",
"serverIP": "159.32.139.47",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.32.139.47 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=131.52.184.16 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.52.184.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=159.32.139.47 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=131.52.184.16 spt=41600 requestMethod=GET app=HTTP requestContext="-" start=Nov 19 2023 07:06:21 rt=1700399181903 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b0704f-95e71c7 cn2=41600 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.52.184.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41600
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700399181903
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:172.104.4.17', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 131.52.184.16
serverIP: 159.32.139.47
userName: - | Explain this syslog message |
<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=103.56.134.130 dpt=80 act=DENY msg=["-"] duser="-" src=130.7.45.70 spt=50192 requestMethod="-" app=HTTP requestContext="-" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.7.45.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 50192,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700399188231 ",
"message": "<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=103.56.134.130 dpt=80 act=DENY msg=[\"-\"] duser=\"-\" src=130.7.45.70 spt=50192 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.7.45.70 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:172.104.4.17",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "130.7.45.70",
"serverIP": "103.56.134.130",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=103.56.134.130 dpt=80 act=DENY msg=["-"] duser="-" src=130.7.45.70 spt=50192 requestMethod="-" app=HTTP requestContext="-" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.7.45.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=103.56.134.130 dpt=80 act=DENY msg=["-"] duser="-" src=130.7.45.70 spt=50192 requestMethod="-" app=HTTP requestContext="-" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=130.7.45.70 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 50192
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700399188231
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:172.104.4.17', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 130.7.45.70
serverIP: 103.56.134.130
userName: - | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.