input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=122.70.19.129 dst=27.220.86.221 protocol=tcp sport=57882 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57882
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 122.70.19.129
serverIP: 27.220.86.221 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=122.231.231.42 dst=63.30.14.75 protocol=tcp sport=443 dport=16307 decision=blocked | {
"action": "block",
"clientport": 16307,
"message": "<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=122.231.231.42 dst=63.30.14.75 protocol=tcp sport=443 dport=16307 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "63.30.14.75",
"serverIP": "122.231.231.42"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=122.231.231.42 dst=63.30.14.75 protocol=tcp sport=443 dport=16307 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=122.231.231.42 dst=63.30.14.75 protocol=tcp sport=443 dport=16307 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 16307
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 63.30.14.75
serverIP: 122.231.231.42 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=181.219.105.45 dst=2.168.130.1 protocol=tcp sport=443 dport=16307 decision=blocked | {
"action": "block",
"clientport": 16307,
"message": "<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=181.219.105.45 dst=2.168.130.1 protocol=tcp sport=443 dport=16307 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "2.168.130.1",
"serverIP": "181.219.105.45"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=181.219.105.45 dst=2.168.130.1 protocol=tcp sport=443 dport=16307 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=181.219.105.45 dst=2.168.130.1 protocol=tcp sport=443 dport=16307 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 16307
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 2.168.130.1
serverIP: 181.219.105.45 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=219.18.124.181 dst=46.1.19.154 protocol=tcp sport=443 dport=16307 decision=blocked | {
"action": "block",
"clientport": 16307,
"message": "<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=219.18.124.181 dst=46.1.19.154 protocol=tcp sport=443 dport=16307 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "46.1.19.154",
"serverIP": "219.18.124.181"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=219.18.124.181 dst=46.1.19.154 protocol=tcp sport=443 dport=16307 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=219.18.124.181 dst=46.1.19.154 protocol=tcp sport=443 dport=16307 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 16307
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 46.1.19.154
serverIP: 219.18.124.181 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=125.134.43.182 dst=142.157.19.187 protocol=tcp sport=443 dport=16307 decision=blocked | {
"action": "block",
"clientport": 16307,
"message": "<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=125.134.43.182 dst=142.157.19.187 protocol=tcp sport=443 dport=16307 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "142.157.19.187",
"serverIP": "125.134.43.182"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=125.134.43.182 dst=142.157.19.187 protocol=tcp sport=443 dport=16307 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691147317.204618772 NORDC_MX400_1 l7_firewall src=125.134.43.182 dst=142.157.19.187 protocol=tcp sport=443 dport=16307 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 16307
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 142.157.19.187
serverIP: 125.134.43.182 | Explain this syslog message |
<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=63.95.228.178 dst=19.184.65.217 protocol=tcp sport=53138 dport=443 decision=blocked | {
"action": "block",
"clientport": 53138,
"message": "<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=63.95.228.178 dst=19.184.65.217 protocol=tcp sport=53138 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "63.95.228.178",
"serverIP": "19.184.65.217"
} | Create a JSON artifact from the message |
<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=63.95.228.178 dst=19.184.65.217 protocol=tcp sport=53138 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=63.95.228.178 dst=19.184.65.217 protocol=tcp sport=53138 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53138
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 63.95.228.178
serverIP: 19.184.65.217 | Explain this syslog message |
<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=221.253.97.106 dst=191.103.104.244 protocol=tcp sport=53138 dport=443 decision=blocked | {
"action": "block",
"clientport": 53138,
"message": "<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=221.253.97.106 dst=191.103.104.244 protocol=tcp sport=53138 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "221.253.97.106",
"serverIP": "191.103.104.244"
} | Create a JSON artifact from the message |
<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=221.253.97.106 dst=191.103.104.244 protocol=tcp sport=53138 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=221.253.97.106 dst=191.103.104.244 protocol=tcp sport=53138 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53138
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 221.253.97.106
serverIP: 191.103.104.244 | Explain this syslog message |
<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=161.93.214.27 dst=32.104.47.154 protocol=tcp sport=53138 dport=443 decision=blocked | {
"action": "block",
"clientport": 53138,
"message": "<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=161.93.214.27 dst=32.104.47.154 protocol=tcp sport=53138 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "161.93.214.27",
"serverIP": "32.104.47.154"
} | Create a JSON artifact from the message |
<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=161.93.214.27 dst=32.104.47.154 protocol=tcp sport=53138 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=161.93.214.27 dst=32.104.47.154 protocol=tcp sport=53138 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53138
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 161.93.214.27
serverIP: 32.104.47.154 | Explain this syslog message |
<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=138.76.169.81 dst=24.139.239.159 protocol=tcp sport=53138 dport=443 decision=blocked | {
"action": "block",
"clientport": 53138,
"message": "<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=138.76.169.81 dst=24.139.239.159 protocol=tcp sport=53138 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "138.76.169.81",
"serverIP": "24.139.239.159"
} | Create a JSON artifact from the message |
<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=138.76.169.81 dst=24.139.239.159 protocol=tcp sport=53138 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=206.74.215.73 1 1688949555.178992111 M67_MX67C_Hardeeville l7_firewall src=138.76.169.81 dst=24.139.239.159 protocol=tcp sport=53138 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53138
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 138.76.169.81
serverIP: 24.139.239.159 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=109.99.98.253 dst=228.123.92.101 protocol=tcp sport=56615 dport=443 decision=blocked | {
"action": "block",
"clientport": 56615,
"message": "<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=109.99.98.253 dst=228.123.92.101 protocol=tcp sport=56615 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "109.99.98.253",
"serverIP": "228.123.92.101"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=109.99.98.253 dst=228.123.92.101 protocol=tcp sport=56615 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=109.99.98.253 dst=228.123.92.101 protocol=tcp sport=56615 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56615
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 109.99.98.253
serverIP: 228.123.92.101 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=27.97.54.120 dst=23.57.179.41 protocol=tcp sport=56615 dport=443 decision=blocked | {
"action": "block",
"clientport": 56615,
"message": "<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=27.97.54.120 dst=23.57.179.41 protocol=tcp sport=56615 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "27.97.54.120",
"serverIP": "23.57.179.41"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=27.97.54.120 dst=23.57.179.41 protocol=tcp sport=56615 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=27.97.54.120 dst=23.57.179.41 protocol=tcp sport=56615 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56615
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 27.97.54.120
serverIP: 23.57.179.41 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=201.69.72.10 dst=99.242.140.27 protocol=tcp sport=56615 dport=443 decision=blocked | {
"action": "block",
"clientport": 56615,
"message": "<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=201.69.72.10 dst=99.242.140.27 protocol=tcp sport=56615 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "201.69.72.10",
"serverIP": "99.242.140.27"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=201.69.72.10 dst=99.242.140.27 protocol=tcp sport=56615 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=201.69.72.10 dst=99.242.140.27 protocol=tcp sport=56615 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56615
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 201.69.72.10
serverIP: 99.242.140.27 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=36.219.76.30 dst=64.228.169.150 protocol=tcp sport=56615 dport=443 decision=blocked | {
"action": "block",
"clientport": 56615,
"message": "<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=36.219.76.30 dst=64.228.169.150 protocol=tcp sport=56615 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "36.219.76.30",
"serverIP": "64.228.169.150"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=36.219.76.30 dst=64.228.169.150 protocol=tcp sport=56615 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1688947390.971581873 M22_MX67C_Marietta l7_firewall src=36.219.76.30 dst=64.228.169.150 protocol=tcp sport=56615 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56615
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 36.219.76.30
serverIP: 64.228.169.150 | Explain this syslog message |
<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=224.46.5.126 dst=125.254.123.186 protocol=tcp sport=55789 dport=443 decision=blocked | {
"action": "block",
"clientport": 55789,
"message": "<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=224.46.5.126 dst=125.254.123.186 protocol=tcp sport=55789 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "224.46.5.126",
"serverIP": "125.254.123.186"
} | Create a JSON artifact from the message |
<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=224.46.5.126 dst=125.254.123.186 protocol=tcp sport=55789 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=224.46.5.126 dst=125.254.123.186 protocol=tcp sport=55789 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55789
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 224.46.5.126
serverIP: 125.254.123.186 | Explain this syslog message |
<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=35.254.129.14 dst=204.130.244.235 protocol=tcp sport=55789 dport=443 decision=blocked | {
"action": "block",
"clientport": 55789,
"message": "<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=35.254.129.14 dst=204.130.244.235 protocol=tcp sport=55789 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "35.254.129.14",
"serverIP": "204.130.244.235"
} | Create a JSON artifact from the message |
<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=35.254.129.14 dst=204.130.244.235 protocol=tcp sport=55789 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=35.254.129.14 dst=204.130.244.235 protocol=tcp sport=55789 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55789
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 35.254.129.14
serverIP: 204.130.244.235 | Explain this syslog message |
<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=5.216.127.185 dst=20.69.173.239 protocol=tcp sport=55789 dport=443 decision=blocked | {
"action": "block",
"clientport": 55789,
"message": "<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=5.216.127.185 dst=20.69.173.239 protocol=tcp sport=55789 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "5.216.127.185",
"serverIP": "20.69.173.239"
} | Create a JSON artifact from the message |
<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=5.216.127.185 dst=20.69.173.239 protocol=tcp sport=55789 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=5.216.127.185 dst=20.69.173.239 protocol=tcp sport=55789 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55789
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 5.216.127.185
serverIP: 20.69.173.239 | Explain this syslog message |
<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=32.135.4.126 dst=9.228.69.113 protocol=tcp sport=55789 dport=443 decision=blocked | {
"action": "block",
"clientport": 55789,
"message": "<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=32.135.4.126 dst=9.228.69.113 protocol=tcp sport=55789 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "32.135.4.126",
"serverIP": "9.228.69.113"
} | Create a JSON artifact from the message |
<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=32.135.4.126 dst=9.228.69.113 protocol=tcp sport=55789 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.82.21.145 1 1688947678.114352960 M82_MX67C_Huntsville l7_firewall src=32.135.4.126 dst=9.228.69.113 protocol=tcp sport=55789 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55789
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 32.135.4.126
serverIP: 9.228.69.113 | Explain this syslog message |
<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=111.121.216.2 dst=11.73.67.39 protocol=tcp sport=52060 dport=443 decision=blocked | {
"action": "block",
"clientport": 52060,
"message": "<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=111.121.216.2 dst=11.73.67.39 protocol=tcp sport=52060 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "111.121.216.2",
"serverIP": "11.73.67.39"
} | Create a JSON artifact from the message |
<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=111.121.216.2 dst=11.73.67.39 protocol=tcp sport=52060 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=111.121.216.2 dst=11.73.67.39 protocol=tcp sport=52060 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52060
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 111.121.216.2
serverIP: 11.73.67.39 | Explain this syslog message |
<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=65.90.254.0 dst=151.193.35.124 protocol=tcp sport=52060 dport=443 decision=blocked | {
"action": "block",
"clientport": 52060,
"message": "<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=65.90.254.0 dst=151.193.35.124 protocol=tcp sport=52060 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "65.90.254.0",
"serverIP": "151.193.35.124"
} | Create a JSON artifact from the message |
<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=65.90.254.0 dst=151.193.35.124 protocol=tcp sport=52060 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=65.90.254.0 dst=151.193.35.124 protocol=tcp sport=52060 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52060
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 65.90.254.0
serverIP: 151.193.35.124 | Explain this syslog message |
<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=161.129.184.185 dst=64.84.246.23 protocol=tcp sport=52060 dport=443 decision=blocked | {
"action": "block",
"clientport": 52060,
"message": "<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=161.129.184.185 dst=64.84.246.23 protocol=tcp sport=52060 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "161.129.184.185",
"serverIP": "64.84.246.23"
} | Create a JSON artifact from the message |
<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=161.129.184.185 dst=64.84.246.23 protocol=tcp sport=52060 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=161.129.184.185 dst=64.84.246.23 protocol=tcp sport=52060 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52060
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 161.129.184.185
serverIP: 64.84.246.23 | Explain this syslog message |
<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=223.188.1.63 dst=108.214.190.36 protocol=tcp sport=52060 dport=443 decision=blocked | {
"action": "block",
"clientport": 52060,
"message": "<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=223.188.1.63 dst=108.214.190.36 protocol=tcp sport=52060 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "223.188.1.63",
"serverIP": "108.214.190.36"
} | Create a JSON artifact from the message |
<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=223.188.1.63 dst=108.214.190.36 protocol=tcp sport=52060 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=174.68.214.235 1 1690787302.568132513 M41_MX67C_Macon l7_firewall src=223.188.1.63 dst=108.214.190.36 protocol=tcp sport=52060 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52060
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 223.188.1.63
serverIP: 108.214.190.36 | Explain this syslog message |
<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=99.92.60.165 dst=109.3.204.10 protocol=tcp sport=60345 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=99.92.60.165 dst=109.3.204.10 protocol=tcp sport=60345 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60345,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "99.92.60.165",
"serverIP": "109.3.204.10"
} | Create a JSON artifact from the message |
<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=99.92.60.165 dst=109.3.204.10 protocol=tcp sport=60345 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=99.92.60.165 dst=109.3.204.10 protocol=tcp sport=60345 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60345
protocol: 6
streamName: meraki_l7_firewall
clientIP: 99.92.60.165
serverIP: 109.3.204.10 | Explain this syslog message |
<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=35.252.196.42 dst=229.11.236.170 protocol=tcp sport=60345 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=35.252.196.42 dst=229.11.236.170 protocol=tcp sport=60345 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60345,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "35.252.196.42",
"serverIP": "229.11.236.170"
} | Create a JSON artifact from the message |
<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=35.252.196.42 dst=229.11.236.170 protocol=tcp sport=60345 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=35.252.196.42 dst=229.11.236.170 protocol=tcp sport=60345 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60345
protocol: 6
streamName: meraki_l7_firewall
clientIP: 35.252.196.42
serverIP: 229.11.236.170 | Explain this syslog message |
<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=54.145.21.203 dst=188.67.101.185 protocol=tcp sport=60345 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=54.145.21.203 dst=188.67.101.185 protocol=tcp sport=60345 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60345,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "54.145.21.203",
"serverIP": "188.67.101.185"
} | Create a JSON artifact from the message |
<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=54.145.21.203 dst=188.67.101.185 protocol=tcp sport=60345 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=54.145.21.203 dst=188.67.101.185 protocol=tcp sport=60345 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60345
protocol: 6
streamName: meraki_l7_firewall
clientIP: 54.145.21.203
serverIP: 188.67.101.185 | Explain this syslog message |
<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=41.21.228.90 dst=154.255.224.22 protocol=tcp sport=60345 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=41.21.228.90 dst=154.255.224.22 protocol=tcp sport=60345 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60345,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "41.21.228.90",
"serverIP": "154.255.224.22"
} | Create a JSON artifact from the message |
<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=41.21.228.90 dst=154.255.224.22 protocol=tcp sport=60345 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.252.40.210 1 1656612814.850309674 M38_MX67C_Conyers l7_firewall src=41.21.228.90 dst=154.255.224.22 protocol=tcp sport=60345 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60345
protocol: 6
streamName: meraki_l7_firewall
clientIP: 41.21.228.90
serverIP: 154.255.224.22 | Explain this syslog message |
<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=69.200.142.35 dst=57.61.99.110 protocol=udp sport=16403 dport=16384 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 16384,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=69.200.142.35 dst=57.61.99.110 protocol=udp sport=16403 dport=16384 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 16403,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "69.200.142.35",
"serverIP": "57.61.99.110"
} | Create a JSON artifact from the message |
<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=69.200.142.35 dst=57.61.99.110 protocol=udp sport=16403 dport=16384 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=69.200.142.35 dst=57.61.99.110 protocol=udp sport=16403 dport=16384 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 16384
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 16403
protocol: 17
streamName: meraki_l7_firewall
clientIP: 69.200.142.35
serverIP: 57.61.99.110 | Explain this syslog message |
<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=75.121.114.79 dst=166.248.189.78 protocol=udp sport=16403 dport=16384 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 16384,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=75.121.114.79 dst=166.248.189.78 protocol=udp sport=16403 dport=16384 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 16403,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "75.121.114.79",
"serverIP": "166.248.189.78"
} | Create a JSON artifact from the message |
<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=75.121.114.79 dst=166.248.189.78 protocol=udp sport=16403 dport=16384 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=75.121.114.79 dst=166.248.189.78 protocol=udp sport=16403 dport=16384 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 16384
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 16403
protocol: 17
streamName: meraki_l7_firewall
clientIP: 75.121.114.79
serverIP: 166.248.189.78 | Explain this syslog message |
<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=203.223.22.100 dst=225.246.164.24 protocol=udp sport=16403 dport=16384 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 16384,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=203.223.22.100 dst=225.246.164.24 protocol=udp sport=16403 dport=16384 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 16403,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "203.223.22.100",
"serverIP": "225.246.164.24"
} | Create a JSON artifact from the message |
<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=203.223.22.100 dst=225.246.164.24 protocol=udp sport=16403 dport=16384 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=203.223.22.100 dst=225.246.164.24 protocol=udp sport=16403 dport=16384 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 16384
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 16403
protocol: 17
streamName: meraki_l7_firewall
clientIP: 203.223.22.100
serverIP: 225.246.164.24 | Explain this syslog message |
<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=79.91.68.88 dst=94.203.67.98 protocol=udp sport=16403 dport=16384 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 16384,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=79.91.68.88 dst=94.203.67.98 protocol=udp sport=16403 dport=16384 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 16403,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "79.91.68.88",
"serverIP": "94.203.67.98"
} | Create a JSON artifact from the message |
<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=79.91.68.88 dst=94.203.67.98 protocol=udp sport=16403 dport=16384 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=70.183.231.238 1 1656613395.775569827 M59_MX67C_Pensacola l7_firewall src=79.91.68.88 dst=94.203.67.98 protocol=udp sport=16403 dport=16384 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 16384
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 16403
protocol: 17
streamName: meraki_l7_firewall
clientIP: 79.91.68.88
serverIP: 94.203.67.98 | Explain this syslog message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.200.100.28 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=168.194.147.7 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=168.194.147.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41452,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/admin/.env",
"localhostname": "WAFirewall",
"localstarttime": "1695631826661 ",
"message": "<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.200.100.28 dpt=80 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=168.194.147.7 spt=41452 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36\" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=168.194.147.7 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:4.17.224.132",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "168.194.147.7",
"serverIP": "87.200.100.28",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.200.100.28 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=168.194.147.7 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=168.194.147.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.200.100.28 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=168.194.147.7 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=168.194.147.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41452
facilitycode: 23
facilitylabel: local7
fqdn: /admin/.env
localhostname: WAFirewall
localstarttime: 1695631826661
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:4.17.224.132', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 168.194.147.7
serverIP: 87.200.100.28
userName: - | Explain this syslog message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.0.85.62 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=158.1.141.234 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.1.141.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41452,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/admin/.env",
"localhostname": "WAFirewall",
"localstarttime": "1695631826661 ",
"message": "<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.0.85.62 dpt=80 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=158.1.141.234 spt=41452 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36\" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.1.141.234 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:4.17.224.132",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "158.1.141.234",
"serverIP": "42.0.85.62",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.0.85.62 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=158.1.141.234 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.1.141.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.0.85.62 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=158.1.141.234 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.1.141.234 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41452
facilitycode: 23
facilitylabel: local7
fqdn: /admin/.env
localhostname: WAFirewall
localstarttime: 1695631826661
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:4.17.224.132', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 158.1.141.234
serverIP: 42.0.85.62
userName: - | Explain this syslog message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=240.28.9.44 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=174.189.110.219 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.189.110.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41452,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/admin/.env",
"localhostname": "WAFirewall",
"localstarttime": "1695631826661 ",
"message": "<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=240.28.9.44 dpt=80 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=174.189.110.219 spt=41452 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36\" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.189.110.219 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:4.17.224.132",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "174.189.110.219",
"serverIP": "240.28.9.44",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=240.28.9.44 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=174.189.110.219 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.189.110.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=240.28.9.44 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=174.189.110.219 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.189.110.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41452
facilitycode: 23
facilitylabel: local7
fqdn: /admin/.env
localhostname: WAFirewall
localstarttime: 1695631826661
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:4.17.224.132', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 174.189.110.219
serverIP: 240.28.9.44
userName: - | Explain this syslog message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.23.235.169 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=48.220.194.172 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=48.220.194.172 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41452,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/admin/.env",
"localhostname": "WAFirewall",
"localstarttime": "1695631826661 ",
"message": "<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.23.235.169 dpt=80 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=48.220.194.172 spt=41452 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36\" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=48.220.194.172 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:4.17.224.132",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "48.220.194.172",
"serverIP": "111.23.235.169",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.23.235.169 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=48.220.194.172 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=48.220.194.172 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=111.23.235.169 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=48.220.194.172 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=48.220.194.172 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41452
facilitycode: 23
facilitylabel: local7
fqdn: /admin/.env
localhostname: WAFirewall
localstarttime: 1695631826661
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:4.17.224.132', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 48.220.194.172
serverIP: 111.23.235.169
userName: - | Explain this syslog message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=37.235.183.91 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=200.97.53.193 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=200.97.53.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41452,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/admin/.env",
"localhostname": "WAFirewall",
"localstarttime": "1695631826661 ",
"message": "<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=37.235.183.91 dpt=80 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=200.97.53.193 spt=41452 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36\" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=200.97.53.193 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:4.17.224.132",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "200.97.53.193",
"serverIP": "37.235.183.91",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=37.235.183.91 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=200.97.53.193 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=200.97.53.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=37.235.183.91 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=200.97.53.193 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=200.97.53.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41452
facilitycode: 23
facilitylabel: local7
fqdn: /admin/.env
localhostname: WAFirewall
localstarttime: 1695631826661
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:4.17.224.132', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 200.97.53.193
serverIP: 37.235.183.91
userName: - | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.