input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=64.206.149.166 dpt=80 act=DENY msg=["-"] duser="-" src=132.200.9.112 spt=50192 requestMethod="-" app=HTTP requestContext="-" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=132.200.9.112 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 50192,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700399188231 ",
"message": "<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=64.206.149.166 dpt=80 act=DENY msg=[\"-\"] duser=\"-\" src=132.200.9.112 spt=50192 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=132.200.9.112 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:172.104.4.17",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "132.200.9.112",
"serverIP": "64.206.149.166",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=64.206.149.166 dpt=80 act=DENY msg=["-"] duser="-" src=132.200.9.112 spt=50192 requestMethod="-" app=HTTP requestContext="-" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=132.200.9.112 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=64.206.149.166 dpt=80 act=DENY msg=["-"] duser="-" src=132.200.9.112 spt=50192 requestMethod="-" app=HTTP requestContext="-" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=132.200.9.112 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 50192
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700399188231
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:172.104.4.17', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 132.200.9.112
serverIP: 64.206.149.166
userName: - | Explain this syslog message |
<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=66.170.0.19 dpt=80 act=DENY msg=["-"] duser="-" src=194.83.10.73 spt=50192 requestMethod="-" app=HTTP requestContext="-" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=194.83.10.73 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 50192,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1700399188231 ",
"message": "<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=66.170.0.19 dpt=80 act=DENY msg=[\"-\"] duser=\"-\" src=194.83.10.73 spt=50192 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=194.83.10.73 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:172.104.4.17",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "194.83.10.73",
"serverIP": "66.170.0.19",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=66.170.0.19 dpt=80 act=DENY msg=["-"] duser="-" src=194.83.10.73 spt=50192 requestMethod="-" app=HTTP requestContext="-" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=194.83.10.73 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 07:06:28 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=66.170.0.19 dpt=80 act=DENY msg=["-"] duser="-" src=194.83.10.73 spt=50192 requestMethod="-" app=HTTP requestContext="-" start=Nov 19 2023 07:06:28 rt=1700399188231 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18be7b08907-d7324c70 cn2=50192 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=194.83.10.73 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 50192
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1700399188231
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:172.104.4.17', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 194.83.10.73
serverIP: 66.170.0.19
userName: - | Explain this syslog message |
<185>Nov 19 04:09:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=71.160.213.90 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=34.144.116.83 spt=33738 requestMethod=POST app=TLSv1.3 requestContext="-" start=Nov 19 2023 04:09:49 rt=1700388589415 request=/GponForm/diag_Form requestClientApplication="curl/7.3.2" dvchost=WAFirewall externalId=18be70ecf37-e76371da cn2=33738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.144.116.83 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 33738,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/GponForm/diag_Form",
"localhostname": "WAFirewall",
"localstarttime": "1700388589415 ",
"message": "<185>Nov 19 04:09:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=71.160.213.90 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=34.144.116.83 spt=33738 requestMethod=POST app=TLSv1.3 requestContext=\"-\" start=Nov 19 2023 04:09:49 rt=1700388589415 request=/GponForm/diag_Form requestClientApplication=\"curl/7.3.2\" dvchost=WAFirewall externalId=18be70ecf37-e76371da cn2=33738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.144.116.83 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:84.54.51.175",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "34.144.116.83",
"serverIP": "71.160.213.90",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 04:09:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=71.160.213.90 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=34.144.116.83 spt=33738 requestMethod=POST app=TLSv1.3 requestContext="-" start=Nov 19 2023 04:09:49 rt=1700388589415 request=/GponForm/diag_Form requestClientApplication="curl/7.3.2" dvchost=WAFirewall externalId=18be70ecf37-e76371da cn2=33738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.144.116.83 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 04:09:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=71.160.213.90 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=34.144.116.83 spt=33738 requestMethod=POST app=TLSv1.3 requestContext="-" start=Nov 19 2023 04:09:49 rt=1700388589415 request=/GponForm/diag_Form requestClientApplication="curl/7.3.2" dvchost=WAFirewall externalId=18be70ecf37-e76371da cn2=33738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.144.116.83 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 33738
facilitycode: 23
facilitylabel: local7
fqdn: /GponForm/diag_Form
localhostname: WAFirewall
localstarttime: 1700388589415
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:84.54.51.175', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 34.144.116.83
serverIP: 71.160.213.90
userName: - | Explain this syslog message |
<185>Nov 19 04:09:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=56.35.94.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=235.96.123.68 spt=33738 requestMethod=POST app=TLSv1.3 requestContext="-" start=Nov 19 2023 04:09:49 rt=1700388589415 request=/GponForm/diag_Form requestClientApplication="curl/7.3.2" dvchost=WAFirewall externalId=18be70ecf37-e76371da cn2=33738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=235.96.123.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 33738,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/GponForm/diag_Form",
"localhostname": "WAFirewall",
"localstarttime": "1700388589415 ",
"message": "<185>Nov 19 04:09:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=56.35.94.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=235.96.123.68 spt=33738 requestMethod=POST app=TLSv1.3 requestContext=\"-\" start=Nov 19 2023 04:09:49 rt=1700388589415 request=/GponForm/diag_Form requestClientApplication=\"curl/7.3.2\" dvchost=WAFirewall externalId=18be70ecf37-e76371da cn2=33738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=235.96.123.68 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:84.54.51.175",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "235.96.123.68",
"serverIP": "56.35.94.219",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 04:09:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=56.35.94.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=235.96.123.68 spt=33738 requestMethod=POST app=TLSv1.3 requestContext="-" start=Nov 19 2023 04:09:49 rt=1700388589415 request=/GponForm/diag_Form requestClientApplication="curl/7.3.2" dvchost=WAFirewall externalId=18be70ecf37-e76371da cn2=33738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=235.96.123.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 04:09:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=56.35.94.219 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=235.96.123.68 spt=33738 requestMethod=POST app=TLSv1.3 requestContext="-" start=Nov 19 2023 04:09:49 rt=1700388589415 request=/GponForm/diag_Form requestClientApplication="curl/7.3.2" dvchost=WAFirewall externalId=18be70ecf37-e76371da cn2=33738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=235.96.123.68 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 33738
facilitycode: 23
facilitylabel: local7
fqdn: /GponForm/diag_Form
localhostname: WAFirewall
localstarttime: 1700388589415
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:84.54.51.175', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 235.96.123.68
serverIP: 56.35.94.219
userName: - | Explain this syslog message |
<185>Nov 19 04:09:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=139.110.173.253 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=235.111.70.85 spt=33738 requestMethod=POST app=TLSv1.3 requestContext="-" start=Nov 19 2023 04:09:49 rt=1700388589415 request=/GponForm/diag_Form requestClientApplication="curl/7.3.2" dvchost=WAFirewall externalId=18be70ecf37-e76371da cn2=33738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=235.111.70.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 33738,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/GponForm/diag_Form",
"localhostname": "WAFirewall",
"localstarttime": "1700388589415 ",
"message": "<185>Nov 19 04:09:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=139.110.173.253 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=235.111.70.85 spt=33738 requestMethod=POST app=TLSv1.3 requestContext=\"-\" start=Nov 19 2023 04:09:49 rt=1700388589415 request=/GponForm/diag_Form requestClientApplication=\"curl/7.3.2\" dvchost=WAFirewall externalId=18be70ecf37-e76371da cn2=33738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=235.111.70.85 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:84.54.51.175",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "235.111.70.85",
"serverIP": "139.110.173.253",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 19 04:09:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=139.110.173.253 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=235.111.70.85 spt=33738 requestMethod=POST app=TLSv1.3 requestContext="-" start=Nov 19 2023 04:09:49 rt=1700388589415 request=/GponForm/diag_Form requestClientApplication="curl/7.3.2" dvchost=WAFirewall externalId=18be70ecf37-e76371da cn2=33738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=235.111.70.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 19 04:09:49 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=139.110.173.253 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=235.111.70.85 spt=33738 requestMethod=POST app=TLSv1.3 requestContext="-" start=Nov 19 2023 04:09:49 rt=1700388589415 request=/GponForm/diag_Form requestClientApplication="curl/7.3.2" dvchost=WAFirewall externalId=18be70ecf37-e76371da cn2=33738 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=235.111.70.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 33738
facilitycode: 23
facilitylabel: local7
fqdn: /GponForm/diag_Form
localhostname: WAFirewall
localstarttime: 1700388589415
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:84.54.51.175', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 235.111.70.85
serverIP: 139.110.173.253
userName: - | Explain this syslog message |
<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=60.79.60.20 dst=80.198.174.177 protocol=tcp sport=55639 dport=443 decision=blocked | {
"action": "block",
"clientport": 55639,
"message": "<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=60.79.60.20 dst=80.198.174.177 protocol=tcp sport=55639 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "60.79.60.20",
"serverIP": "80.198.174.177"
} | Create a JSON artifact from the message |
<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=60.79.60.20 dst=80.198.174.177 protocol=tcp sport=55639 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=60.79.60.20 dst=80.198.174.177 protocol=tcp sport=55639 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55639
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 60.79.60.20
serverIP: 80.198.174.177 | Explain this syslog message |
<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=183.212.16.183 dst=63.64.16.237 protocol=tcp sport=55639 dport=443 decision=blocked | {
"action": "block",
"clientport": 55639,
"message": "<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=183.212.16.183 dst=63.64.16.237 protocol=tcp sport=55639 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "183.212.16.183",
"serverIP": "63.64.16.237"
} | Create a JSON artifact from the message |
<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=183.212.16.183 dst=63.64.16.237 protocol=tcp sport=55639 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=183.212.16.183 dst=63.64.16.237 protocol=tcp sport=55639 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55639
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 183.212.16.183
serverIP: 63.64.16.237 | Explain this syslog message |
<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=225.138.227.53 dst=130.204.44.221 protocol=tcp sport=55639 dport=443 decision=blocked | {
"action": "block",
"clientport": 55639,
"message": "<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=225.138.227.53 dst=130.204.44.221 protocol=tcp sport=55639 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "225.138.227.53",
"serverIP": "130.204.44.221"
} | Create a JSON artifact from the message |
<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=225.138.227.53 dst=130.204.44.221 protocol=tcp sport=55639 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=225.138.227.53 dst=130.204.44.221 protocol=tcp sport=55639 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55639
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 225.138.227.53
serverIP: 130.204.44.221 | Explain this syslog message |
<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=138.154.79.73 dst=205.185.3.204 protocol=tcp sport=55639 dport=443 decision=blocked | {
"action": "block",
"clientport": 55639,
"message": "<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=138.154.79.73 dst=205.185.3.204 protocol=tcp sport=55639 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "138.154.79.73",
"serverIP": "205.185.3.204"
} | Create a JSON artifact from the message |
<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=138.154.79.73 dst=205.185.3.204 protocol=tcp sport=55639 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.147.194.173 1 1684850679.294530396 M1111_MX67C_Loganville l7_firewall src=138.154.79.73 dst=205.185.3.204 protocol=tcp sport=55639 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55639
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 138.154.79.73
serverIP: 205.185.3.204 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=198.239.231.116 dst=159.52.138.75 protocol=tcp sport=58586 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=198.239.231.116 dst=159.52.138.75 protocol=tcp sport=58586 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58586,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "198.239.231.116",
"serverIP": "159.52.138.75"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=198.239.231.116 dst=159.52.138.75 protocol=tcp sport=58586 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=198.239.231.116 dst=159.52.138.75 protocol=tcp sport=58586 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58586
protocol: 6
streamName: meraki_l7_firewall
clientIP: 198.239.231.116
serverIP: 159.52.138.75 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=6.106.126.58 dst=144.131.35.205 protocol=tcp sport=58586 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=6.106.126.58 dst=144.131.35.205 protocol=tcp sport=58586 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58586,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "6.106.126.58",
"serverIP": "144.131.35.205"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=6.106.126.58 dst=144.131.35.205 protocol=tcp sport=58586 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=6.106.126.58 dst=144.131.35.205 protocol=tcp sport=58586 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58586
protocol: 6
streamName: meraki_l7_firewall
clientIP: 6.106.126.58
serverIP: 144.131.35.205 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=41.29.131.65 dst=204.248.247.5 protocol=tcp sport=58586 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=41.29.131.65 dst=204.248.247.5 protocol=tcp sport=58586 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58586,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "41.29.131.65",
"serverIP": "204.248.247.5"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=41.29.131.65 dst=204.248.247.5 protocol=tcp sport=58586 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=41.29.131.65 dst=204.248.247.5 protocol=tcp sport=58586 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58586
protocol: 6
streamName: meraki_l7_firewall
clientIP: 41.29.131.65
serverIP: 204.248.247.5 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=229.116.57.51 dst=48.203.253.9 protocol=tcp sport=58586 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=229.116.57.51 dst=48.203.253.9 protocol=tcp sport=58586 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58586,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "229.116.57.51",
"serverIP": "48.203.253.9"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=229.116.57.51 dst=48.203.253.9 protocol=tcp sport=58586 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660842020.490302473 M61_MX67C_Savannah l7_firewall src=229.116.57.51 dst=48.203.253.9 protocol=tcp sport=58586 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58586
protocol: 6
streamName: meraki_l7_firewall
clientIP: 229.116.57.51
serverIP: 48.203.253.9 | Explain this syslog message |
<185>Jul 13 09:38:49 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=23.100.93.184 dpt=80 act=DENY msg=[H] duser="-" src=77.163.73.163 spt=54536 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 09:38:49 rt=1720881529276 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac8841bc-c69c264 cn2=54536 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=77.163.73.163 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54536,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1720881529276 ",
"message": "<185>Jul 13 09:38:49 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=23.100.93.184 dpt=80 act=DENY msg=[H] duser=\"-\" src=77.163.73.163 spt=54536 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 13 2024 09:38:49 rt=1720881529276 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190ac8841bc-c69c264 cn2=54536 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=77.163.73.163 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:66.240.205.34",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "77.163.73.163",
"serverIP": "23.100.93.184",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 13 09:38:49 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=23.100.93.184 dpt=80 act=DENY msg=[H] duser="-" src=77.163.73.163 spt=54536 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 09:38:49 rt=1720881529276 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac8841bc-c69c264 cn2=54536 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=77.163.73.163 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 13 09:38:49 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=23.100.93.184 dpt=80 act=DENY msg=[H] duser="-" src=77.163.73.163 spt=54536 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 09:38:49 rt=1720881529276 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac8841bc-c69c264 cn2=54536 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=77.163.73.163 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54536
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1720881529276
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:66.240.205.34', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 77.163.73.163
serverIP: 23.100.93.184
userName: - | Explain this syslog message |
<185>Jul 13 09:38:49 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=124.7.5.218 dpt=80 act=DENY msg=[H] duser="-" src=58.92.215.220 spt=54536 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 09:38:49 rt=1720881529276 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac8841bc-c69c264 cn2=54536 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=58.92.215.220 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54536,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1720881529276 ",
"message": "<185>Jul 13 09:38:49 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=124.7.5.218 dpt=80 act=DENY msg=[H] duser=\"-\" src=58.92.215.220 spt=54536 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 13 2024 09:38:49 rt=1720881529276 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190ac8841bc-c69c264 cn2=54536 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=58.92.215.220 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:66.240.205.34",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "58.92.215.220",
"serverIP": "124.7.5.218",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 13 09:38:49 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=124.7.5.218 dpt=80 act=DENY msg=[H] duser="-" src=58.92.215.220 spt=54536 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 09:38:49 rt=1720881529276 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac8841bc-c69c264 cn2=54536 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=58.92.215.220 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 13 09:38:49 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=124.7.5.218 dpt=80 act=DENY msg=[H] duser="-" src=58.92.215.220 spt=54536 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 09:38:49 rt=1720881529276 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac8841bc-c69c264 cn2=54536 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=58.92.215.220 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54536
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1720881529276
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:66.240.205.34', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 58.92.215.220
serverIP: 124.7.5.218
userName: - | Explain this syslog message |
<185>Jul 13 09:38:49 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=179.184.229.226 dpt=80 act=DENY msg=[H] duser="-" src=35.203.191.45 spt=54536 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 09:38:49 rt=1720881529276 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac8841bc-c69c264 cn2=54536 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=35.203.191.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54536,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1720881529276 ",
"message": "<185>Jul 13 09:38:49 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=179.184.229.226 dpt=80 act=DENY msg=[H] duser=\"-\" src=35.203.191.45 spt=54536 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Jul 13 2024 09:38:49 rt=1720881529276 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=190ac8841bc-c69c264 cn2=54536 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=35.203.191.45 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:66.240.205.34",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "35.203.191.45",
"serverIP": "179.184.229.226",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 13 09:38:49 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=179.184.229.226 dpt=80 act=DENY msg=[H] duser="-" src=35.203.191.45 spt=54536 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 09:38:49 rt=1720881529276 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac8841bc-c69c264 cn2=54536 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=35.203.191.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 13 09:38:49 WAFirewall CEF:0|Barracuda|WAF|1220|118|INVALID_METHOD|1|cat=WF dst=179.184.229.226 dpt=80 act=DENY msg=[H] duser="-" src=35.203.191.45 spt=54536 requestMethod="-" app=HTTP requestContext="-" start=Jul 13 2024 09:38:49 rt=1720881529276 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=190ac8841bc-c69c264 cn2=54536 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=35.203.191.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54536
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1720881529276
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:66.240.205.34', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 35.203.191.45
serverIP: 179.184.229.226
userName: - | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=198.31.155.238 dst=122.5.110.113 protocol=tcp sport=80 dport=43924 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=198.31.155.238 dst=122.5.110.113 protocol=tcp sport=80 dport=43924 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 43924,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "122.5.110.113",
"serverIP": "198.31.155.238"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=198.31.155.238 dst=122.5.110.113 protocol=tcp sport=80 dport=43924 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=198.31.155.238 dst=122.5.110.113 protocol=tcp sport=80 dport=43924 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 43924
protocol: 6
streamName: meraki_l7_firewall
clientIP: 122.5.110.113
serverIP: 198.31.155.238 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=204.206.189.112 dst=51.86.32.133 protocol=tcp sport=80 dport=43924 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=204.206.189.112 dst=51.86.32.133 protocol=tcp sport=80 dport=43924 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 43924,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "51.86.32.133",
"serverIP": "204.206.189.112"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=204.206.189.112 dst=51.86.32.133 protocol=tcp sport=80 dport=43924 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=204.206.189.112 dst=51.86.32.133 protocol=tcp sport=80 dport=43924 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 43924
protocol: 6
streamName: meraki_l7_firewall
clientIP: 51.86.32.133
serverIP: 204.206.189.112 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=198.236.165.60 dst=77.57.40.2 protocol=tcp sport=80 dport=43924 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=198.236.165.60 dst=77.57.40.2 protocol=tcp sport=80 dport=43924 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 43924,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "77.57.40.2",
"serverIP": "198.236.165.60"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=198.236.165.60 dst=77.57.40.2 protocol=tcp sport=80 dport=43924 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=198.236.165.60 dst=77.57.40.2 protocol=tcp sport=80 dport=43924 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 43924
protocol: 6
streamName: meraki_l7_firewall
clientIP: 77.57.40.2
serverIP: 198.236.165.60 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=7.108.138.244 dst=30.152.183.164 protocol=tcp sport=80 dport=43924 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=7.108.138.244 dst=30.152.183.164 protocol=tcp sport=80 dport=43924 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 43924,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "30.152.183.164",
"serverIP": "7.108.138.244"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=7.108.138.244 dst=30.152.183.164 protocol=tcp sport=80 dport=43924 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657720810.421276042 NORDC_MX400_1 l7_firewall src=7.108.138.244 dst=30.152.183.164 protocol=tcp sport=80 dport=43924 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 43924
protocol: 6
streamName: meraki_l7_firewall
clientIP: 30.152.183.164
serverIP: 7.108.138.244 | Explain this syslog message |
<132>Sep 11 12:13:46 library6 drupal: https://library.umbrella.com|1694434426|access denied|47.80.77.19|https://library.umbrella.com/||0||node/21899 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "library6",
"localstarttime": "Sep 11 12:13:46",
"message": "<132>Sep 11 12:13:46 library6 drupal: https://library.umbrella.com|1694434426|access denied|47.80.77.19|https://library.umbrella.com/||0||node/21899",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.18.123",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1694434426",
"tags": [
"node/21899",
"drupal",
"rfc3164",
"block",
"https://library.witfoo.com",
"access denied",
"management_message"
],
"uri": "https://library.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "47.80.77.19"
} | Create a JSON artifact from the message |
<132>Sep 11 12:13:46 library6 drupal: https://library.umbrella.com|1694434426|access denied|47.80.77.19|https://library.umbrella.com/||0||node/21899 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Sep 11 12:13:46 library6 drupal: https://library.umbrella.com|1694434426|access denied|47.80.77.19|https://library.umbrella.com/||0||node/21899 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: library6
localstarttime: Sep 11 12:13:46
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.18.123
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1694434426
tags: ['node/21899', 'drupal', 'rfc3164', 'block', 'https://library.witfoo.com', 'access denied', 'management_message']
uri: https://library.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 47.80.77.19 | Explain this syslog message |
<132>Sep 11 12:13:46 library5 drupal: https://library.stark.com|1694434426|access denied|160.66.130.10|https://library.stark.com/||0||node/21899 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "library5",
"localstarttime": "Sep 11 12:13:46",
"message": "<132>Sep 11 12:13:46 library5 drupal: https://library.stark.com|1694434426|access denied|160.66.130.10|https://library.stark.com/||0||node/21899",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.17.201",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1694434426",
"tags": [
"node/21899",
"drupal",
"rfc3164",
"block",
"https://library.witfoo.com",
"access denied",
"management_message"
],
"uri": "https://library.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "160.66.130.10"
} | Create a JSON artifact from the message |
<132>Sep 11 12:13:46 library5 drupal: https://library.stark.com|1694434426|access denied|160.66.130.10|https://library.stark.com/||0||node/21899 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Sep 11 12:13:46 library5 drupal: https://library.stark.com|1694434426|access denied|160.66.130.10|https://library.stark.com/||0||node/21899 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: library5
localstarttime: Sep 11 12:13:46
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.17.201
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1694434426
tags: ['node/21899', 'drupal', 'rfc3164', 'block', 'https://library.witfoo.com', 'access denied', 'management_message']
uri: https://library.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 160.66.130.10 | Explain this syslog message |
<132>Sep 11 12:13:46 library4 drupal: https://library.stark.com|1694434426|access denied|49.62.145.206|https://library.stark.com/||0||node/21899 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "library4",
"localstarttime": "Sep 11 12:13:46",
"message": "<132>Sep 11 12:13:46 library4 drupal: https://library.stark.com|1694434426|access denied|49.62.145.206|https://library.stark.com/||0||node/21899",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.15",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1694434426",
"tags": [
"node/21899",
"drupal",
"rfc3164",
"block",
"https://library.witfoo.com",
"access denied",
"management_message"
],
"uri": "https://library.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "49.62.145.206"
} | Create a JSON artifact from the message |
<132>Sep 11 12:13:46 library4 drupal: https://library.stark.com|1694434426|access denied|49.62.145.206|https://library.stark.com/||0||node/21899 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Sep 11 12:13:46 library4 drupal: https://library.stark.com|1694434426|access denied|49.62.145.206|https://library.stark.com/||0||node/21899 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: library4
localstarttime: Sep 11 12:13:46
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.15
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1694434426
tags: ['node/21899', 'drupal', 'rfc3164', 'block', 'https://library.witfoo.com', 'access denied', 'management_message']
uri: https://library.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 49.62.145.206 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=154.175.78.214 dst=66.234.49.229 protocol=tcp sport=80 dport=19581 decision=blocked | {
"action": "block",
"clientport": 19581,
"message": "<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=154.175.78.214 dst=66.234.49.229 protocol=tcp sport=80 dport=19581 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "66.234.49.229",
"serverIP": "154.175.78.214"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=154.175.78.214 dst=66.234.49.229 protocol=tcp sport=80 dport=19581 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=154.175.78.214 dst=66.234.49.229 protocol=tcp sport=80 dport=19581 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 19581
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 66.234.49.229
serverIP: 154.175.78.214 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=130.192.4.139 dst=116.71.142.179 protocol=tcp sport=80 dport=19581 decision=blocked | {
"action": "block",
"clientport": 19581,
"message": "<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=130.192.4.139 dst=116.71.142.179 protocol=tcp sport=80 dport=19581 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "116.71.142.179",
"serverIP": "130.192.4.139"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=130.192.4.139 dst=116.71.142.179 protocol=tcp sport=80 dport=19581 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=130.192.4.139 dst=116.71.142.179 protocol=tcp sport=80 dport=19581 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 19581
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 116.71.142.179
serverIP: 130.192.4.139 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=122.1.185.80 dst=2.180.17.126 protocol=tcp sport=80 dport=19581 decision=blocked | {
"action": "block",
"clientport": 19581,
"message": "<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=122.1.185.80 dst=2.180.17.126 protocol=tcp sport=80 dport=19581 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "2.180.17.126",
"serverIP": "122.1.185.80"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=122.1.185.80 dst=2.180.17.126 protocol=tcp sport=80 dport=19581 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=122.1.185.80 dst=2.180.17.126 protocol=tcp sport=80 dport=19581 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 19581
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 2.180.17.126
serverIP: 122.1.185.80 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=86.121.225.73 dst=211.166.65.21 protocol=tcp sport=80 dport=19581 decision=blocked | {
"action": "block",
"clientport": 19581,
"message": "<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=86.121.225.73 dst=211.166.65.21 protocol=tcp sport=80 dport=19581 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "211.166.65.21",
"serverIP": "86.121.225.73"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=86.121.225.73 dst=211.166.65.21 protocol=tcp sport=80 dport=19581 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689061120.939766315 NORDC_MX400_1 l7_firewall src=86.121.225.73 dst=211.166.65.21 protocol=tcp sport=80 dport=19581 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 19581
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 211.166.65.21
serverIP: 86.121.225.73 | Explain this syslog message |
<185>Oct 24 04:00:30 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=48.242.3.151 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.10.210.139 spt=33054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:00:30 rt=1666602030634 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; DataForSeoBot/1.0; +https://dataforseo.com/dataforseo-bot)" dvchost=WAFirewall externalId=1840938d618-d9416e32 cn2=33054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.10.210.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:136.243.228.177",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 24 04:00:30 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=48.242.3.151 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=159.10.210.139 spt=33054 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 24 2022 04:00:30 rt=1666602030634 request=/Volunteer/VolOpInfo.jsp requestClientApplication=\"Mozilla/5.0 (compatible; DataForSeoBot/1.0; +https://dataforseo.com/dataforseo-bot)\" dvchost=WAFirewall externalId=1840938d618-d9416e32 cn2=33054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.10.210.139 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1666602030634 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/Volunteer/VolOpInfo.jsp",
"clientport": 33054,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "159.10.210.139",
"serverIP": "48.242.3.151",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 24 04:00:30 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=48.242.3.151 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.10.210.139 spt=33054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:00:30 rt=1666602030634 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; DataForSeoBot/1.0; +https://dataforseo.com/dataforseo-bot)" dvchost=WAFirewall externalId=1840938d618-d9416e32 cn2=33054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.10.210.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 24 04:00:30 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=48.242.3.151 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.10.210.139 spt=33054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:00:30 rt=1666602030634 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; DataForSeoBot/1.0; +https://dataforseo.com/dataforseo-bot)" dvchost=WAFirewall externalId=1840938d618-d9416e32 cn2=33054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.10.210.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:136.243.228.177', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1666602030634
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /Volunteer/VolOpInfo.jsp
clientport: 33054
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 159.10.210.139
serverIP: 48.242.3.151
userName: - | Explain this syslog message |
<185>Oct 24 04:00:30 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=8.66.232.64 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.129.91.45 spt=33054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:00:30 rt=1666602030634 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; DataForSeoBot/1.0; +https://dataforseo.com/dataforseo-bot)" dvchost=WAFirewall externalId=1840938d618-d9416e32 cn2=33054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.129.91.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:136.243.228.177",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 24 04:00:30 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=8.66.232.64 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=122.129.91.45 spt=33054 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 24 2022 04:00:30 rt=1666602030634 request=/Volunteer/VolOpInfo.jsp requestClientApplication=\"Mozilla/5.0 (compatible; DataForSeoBot/1.0; +https://dataforseo.com/dataforseo-bot)\" dvchost=WAFirewall externalId=1840938d618-d9416e32 cn2=33054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.129.91.45 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1666602030634 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/Volunteer/VolOpInfo.jsp",
"clientport": 33054,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "122.129.91.45",
"serverIP": "8.66.232.64",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 24 04:00:30 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=8.66.232.64 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.129.91.45 spt=33054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:00:30 rt=1666602030634 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; DataForSeoBot/1.0; +https://dataforseo.com/dataforseo-bot)" dvchost=WAFirewall externalId=1840938d618-d9416e32 cn2=33054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.129.91.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 24 04:00:30 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=8.66.232.64 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=122.129.91.45 spt=33054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:00:30 rt=1666602030634 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; DataForSeoBot/1.0; +https://dataforseo.com/dataforseo-bot)" dvchost=WAFirewall externalId=1840938d618-d9416e32 cn2=33054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=122.129.91.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:136.243.228.177', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1666602030634
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /Volunteer/VolOpInfo.jsp
clientport: 33054
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 122.129.91.45
serverIP: 8.66.232.64
userName: - | Explain this syslog message |
<185>Oct 24 04:17:36 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=142.7.157.181 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=206.19.195.209 spt=64694 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:17:36 rt=1666603056140 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18409487bd4-dd999bfb cn2=64694 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=206.19.195.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"AttackGroup:Forceful Browsing",
"ProxyIP:51.222.253.14"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 24 04:17:36 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=142.7.157.181 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=206.19.195.209 spt=64694 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 24 2022 04:17:36 rt=1666603056140 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)\" dvchost=WAFirewall externalId=18409487bd4-dd999bfb cn2=64694 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=206.19.195.209 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1666603056140 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/robots.txt",
"clientport": 64694,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "206.19.195.209",
"serverIP": "142.7.157.181",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 24 04:17:36 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=142.7.157.181 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=206.19.195.209 spt=64694 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:17:36 rt=1666603056140 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18409487bd4-dd999bfb cn2=64694 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=206.19.195.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 24 04:17:36 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=142.7.157.181 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=206.19.195.209 spt=64694 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:17:36 rt=1666603056140 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18409487bd4-dd999bfb cn2=64694 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=206.19.195.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'AttackGroup:Forceful Browsing', 'ProxyIP:51.222.253.14']
productids: [0]
sourceinfo: unknown
localstarttime: 1666603056140
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /robots.txt
clientport: 64694
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 206.19.195.209
serverIP: 142.7.157.181
userName: - | Explain this syslog message |
<185>Oct 24 04:17:36 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=212.91.227.5 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.40.91.186 spt=64694 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:17:36 rt=1666603056140 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18409487bd4-dd999bfb cn2=64694 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.40.91.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"AttackGroup:Forceful Browsing",
"ProxyIP:51.222.253.14"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 24 04:17:36 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=212.91.227.5 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=93.40.91.186 spt=64694 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 24 2022 04:17:36 rt=1666603056140 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)\" dvchost=WAFirewall externalId=18409487bd4-dd999bfb cn2=64694 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.40.91.186 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1666603056140 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/robots.txt",
"clientport": 64694,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "93.40.91.186",
"serverIP": "212.91.227.5",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 24 04:17:36 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=212.91.227.5 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.40.91.186 spt=64694 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:17:36 rt=1666603056140 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18409487bd4-dd999bfb cn2=64694 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.40.91.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 24 04:17:36 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=212.91.227.5 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.40.91.186 spt=64694 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:17:36 rt=1666603056140 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18409487bd4-dd999bfb cn2=64694 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.40.91.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'AttackGroup:Forceful Browsing', 'ProxyIP:51.222.253.14']
productids: [0]
sourceinfo: unknown
localstarttime: 1666603056140
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /robots.txt
clientport: 64694
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 93.40.91.186
serverIP: 212.91.227.5
userName: - | Explain this syslog message |
<185>Oct 24 04:17:36 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=157.49.87.1 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.123.8.105 spt=64694 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:17:36 rt=1666603056140 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18409487bd4-dd999bfb cn2=64694 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.123.8.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"AttackGroup:Forceful Browsing",
"ProxyIP:51.222.253.14"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 24 04:17:36 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=157.49.87.1 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=204.123.8.105 spt=64694 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 24 2022 04:17:36 rt=1666603056140 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)\" dvchost=WAFirewall externalId=18409487bd4-dd999bfb cn2=64694 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.123.8.105 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1666603056140 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/robots.txt",
"clientport": 64694,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "204.123.8.105",
"serverIP": "157.49.87.1",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 24 04:17:36 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=157.49.87.1 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.123.8.105 spt=64694 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:17:36 rt=1666603056140 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18409487bd4-dd999bfb cn2=64694 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.123.8.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 24 04:17:36 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=157.49.87.1 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=204.123.8.105 spt=64694 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:17:36 rt=1666603056140 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)" dvchost=WAFirewall externalId=18409487bd4-dd999bfb cn2=64694 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=204.123.8.105 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'AttackGroup:Forceful Browsing', 'ProxyIP:51.222.253.14']
productids: [0]
sourceinfo: unknown
localstarttime: 1666603056140
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /robots.txt
clientport: 64694
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 204.123.8.105
serverIP: 157.49.87.1
userName: - | Explain this syslog message |
<185>Oct 24 04:00:30 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=15.148.178.193 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=144.36.165.39 spt=33054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:00:30 rt=1666602030634 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; DataForSeoBot/1.0; +https://dataforseo.com/dataforseo-bot)" dvchost=WAFirewall externalId=1840938d618-d9416e32 cn2=33054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.36.165.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:136.243.228.177",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 24 04:00:30 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=15.148.178.193 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=144.36.165.39 spt=33054 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 24 2022 04:00:30 rt=1666602030634 request=/Volunteer/VolOpInfo.jsp requestClientApplication=\"Mozilla/5.0 (compatible; DataForSeoBot/1.0; +https://dataforseo.com/dataforseo-bot)\" dvchost=WAFirewall externalId=1840938d618-d9416e32 cn2=33054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.36.165.39 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1666602030634 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/Volunteer/VolOpInfo.jsp",
"clientport": 33054,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "144.36.165.39",
"serverIP": "15.148.178.193",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 24 04:00:30 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=15.148.178.193 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=144.36.165.39 spt=33054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:00:30 rt=1666602030634 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; DataForSeoBot/1.0; +https://dataforseo.com/dataforseo-bot)" dvchost=WAFirewall externalId=1840938d618-d9416e32 cn2=33054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.36.165.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 24 04:00:30 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=15.148.178.193 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=144.36.165.39 spt=33054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 24 2022 04:00:30 rt=1666602030634 request=/Volunteer/VolOpInfo.jsp requestClientApplication="Mozilla/5.0 (compatible; DataForSeoBot/1.0; +https://dataforseo.com/dataforseo-bot)" dvchost=WAFirewall externalId=1840938d618-d9416e32 cn2=33054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=144.36.165.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:136.243.228.177', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1666602030634
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /Volunteer/VolOpInfo.jsp
clientport: 33054
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 144.36.165.39
serverIP: 15.148.178.193
userName: - | Explain this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=53.14.169.131 dst=176.210.22.158 protocol=udp sport=54650 dport=53 decision=blocked | {
"action": "block",
"clientport": 54650,
"message": "<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=53.14.169.131 dst=176.210.22.158 protocol=udp sport=54650 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "53.14.169.131",
"serverIP": "176.210.22.158"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.