input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=178.244.108.69 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=69.129.6.239 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.129.6.239 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41452,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/admin/.env",
"localhostname": "WAFirewall",
"localstarttime": "1695631826661 ",
"message": "<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=178.244.108.69 dpt=80 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=69.129.6.239 spt=41452 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36\" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.129.6.239 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:4.17.224.132",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "69.129.6.239",
"serverIP": "178.244.108.69",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=178.244.108.69 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=69.129.6.239 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.129.6.239 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 25 03:50:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=178.244.108.69 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=69.129.6.239 spt=41452 requestMethod=GET app=HTTP requestContext="-" start=Sep 25 2023 03:50:26 rt=1695631826661 request=/admin/.env requestClientApplication="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" dvchost=WAFirewall externalId=18acb885ee5-1093ff01 cn2=41452 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=69.129.6.239 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41452
facilitycode: 23
facilitylabel: local7
fqdn: /admin/.env
localhostname: WAFirewall
localstarttime: 1695631826661
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:4.17.224.132', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 69.129.6.239
serverIP: 178.244.108.69
userName: - | Explain this syslog message |
<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=33.237.67.0 dst=89.123.221.245 protocol=tcp sport=63560 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=33.237.67.0 dst=89.123.221.245 protocol=tcp sport=63560 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63560,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "33.237.67.0",
"serverIP": "89.123.221.245"
} | Create a JSON artifact from the message |
<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=33.237.67.0 dst=89.123.221.245 protocol=tcp sport=63560 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=33.237.67.0 dst=89.123.221.245 protocol=tcp sport=63560 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63560
protocol: 6
streamName: meraki_l7_firewall
clientIP: 33.237.67.0
serverIP: 89.123.221.245 | Explain this syslog message |
<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=42.253.158.212 dst=12.92.88.215 protocol=tcp sport=63560 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=42.253.158.212 dst=12.92.88.215 protocol=tcp sport=63560 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63560,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "42.253.158.212",
"serverIP": "12.92.88.215"
} | Create a JSON artifact from the message |
<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=42.253.158.212 dst=12.92.88.215 protocol=tcp sport=63560 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=42.253.158.212 dst=12.92.88.215 protocol=tcp sport=63560 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63560
protocol: 6
streamName: meraki_l7_firewall
clientIP: 42.253.158.212
serverIP: 12.92.88.215 | Explain this syslog message |
<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=229.142.11.82 dst=49.94.71.94 protocol=tcp sport=63560 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=229.142.11.82 dst=49.94.71.94 protocol=tcp sport=63560 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63560,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "229.142.11.82",
"serverIP": "49.94.71.94"
} | Create a JSON artifact from the message |
<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=229.142.11.82 dst=49.94.71.94 protocol=tcp sport=63560 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=229.142.11.82 dst=49.94.71.94 protocol=tcp sport=63560 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63560
protocol: 6
streamName: meraki_l7_firewall
clientIP: 229.142.11.82
serverIP: 49.94.71.94 | Explain this syslog message |
<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=49.104.72.192 dst=7.42.245.196 protocol=tcp sport=63560 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=49.104.72.192 dst=7.42.245.196 protocol=tcp sport=63560 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63560,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "49.104.72.192",
"serverIP": "7.42.245.196"
} | Create a JSON artifact from the message |
<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=49.104.72.192 dst=7.42.245.196 protocol=tcp sport=63560 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=156.19.155.186 1 1658133616.987727338 M47_MX67C_Opelika l7_firewall src=49.104.72.192 dst=7.42.245.196 protocol=tcp sport=63560 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63560
protocol: 6
streamName: meraki_l7_firewall
clientIP: 49.104.72.192
serverIP: 7.42.245.196 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=210.218.10.51 dst=213.115.51.96 protocol=udp sport=54433 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=210.218.10.51 dst=213.115.51.96 protocol=udp sport=54433 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54433,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "210.218.10.51",
"serverIP": "213.115.51.96"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=210.218.10.51 dst=213.115.51.96 protocol=udp sport=54433 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=210.218.10.51 dst=213.115.51.96 protocol=udp sport=54433 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54433
protocol: 17
streamName: meraki_l7_firewall
clientIP: 210.218.10.51
serverIP: 213.115.51.96 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=126.244.97.143 dst=213.104.68.175 protocol=udp sport=54433 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=126.244.97.143 dst=213.104.68.175 protocol=udp sport=54433 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54433,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "126.244.97.143",
"serverIP": "213.104.68.175"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=126.244.97.143 dst=213.104.68.175 protocol=udp sport=54433 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=126.244.97.143 dst=213.104.68.175 protocol=udp sport=54433 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54433
protocol: 17
streamName: meraki_l7_firewall
clientIP: 126.244.97.143
serverIP: 213.104.68.175 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=106.126.186.96 dst=243.146.179.30 protocol=udp sport=54433 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=106.126.186.96 dst=243.146.179.30 protocol=udp sport=54433 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54433,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "106.126.186.96",
"serverIP": "243.146.179.30"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=106.126.186.96 dst=243.146.179.30 protocol=udp sport=54433 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=106.126.186.96 dst=243.146.179.30 protocol=udp sport=54433 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54433
protocol: 17
streamName: meraki_l7_firewall
clientIP: 106.126.186.96
serverIP: 243.146.179.30 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=107.36.238.137 dst=232.40.250.244 protocol=udp sport=54433 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=107.36.238.137 dst=232.40.250.244 protocol=udp sport=54433 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54433,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "107.36.238.137",
"serverIP": "232.40.250.244"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=107.36.238.137 dst=232.40.250.244 protocol=udp sport=54433 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656671899.002730565 NORDC_MX400_1 l7_firewall src=107.36.238.137 dst=232.40.250.244 protocol=udp sport=54433 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54433
protocol: 17
streamName: meraki_l7_firewall
clientIP: 107.36.238.137
serverIP: 232.40.250.244 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=147.193.95.240 dst=160.135.243.225 protocol=tcp sport=52527 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=147.193.95.240 dst=160.135.243.225 protocol=tcp sport=52527 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52527,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "147.193.95.240",
"serverIP": "160.135.243.225"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=147.193.95.240 dst=160.135.243.225 protocol=tcp sport=52527 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=147.193.95.240 dst=160.135.243.225 protocol=tcp sport=52527 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52527
protocol: 6
streamName: meraki_l7_firewall
clientIP: 147.193.95.240
serverIP: 160.135.243.225 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=109.35.84.89 dst=249.26.195.137 protocol=tcp sport=52527 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=109.35.84.89 dst=249.26.195.137 protocol=tcp sport=52527 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52527,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "109.35.84.89",
"serverIP": "249.26.195.137"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=109.35.84.89 dst=249.26.195.137 protocol=tcp sport=52527 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=109.35.84.89 dst=249.26.195.137 protocol=tcp sport=52527 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52527
protocol: 6
streamName: meraki_l7_firewall
clientIP: 109.35.84.89
serverIP: 249.26.195.137 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=77.233.169.118 dst=93.83.227.143 protocol=tcp sport=52527 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=77.233.169.118 dst=93.83.227.143 protocol=tcp sport=52527 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52527,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "77.233.169.118",
"serverIP": "93.83.227.143"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=77.233.169.118 dst=93.83.227.143 protocol=tcp sport=52527 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=77.233.169.118 dst=93.83.227.143 protocol=tcp sport=52527 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52527
protocol: 6
streamName: meraki_l7_firewall
clientIP: 77.233.169.118
serverIP: 93.83.227.143 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=25.13.23.62 dst=223.67.140.195 protocol=tcp sport=52527 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=25.13.23.62 dst=223.67.140.195 protocol=tcp sport=52527 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52527,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "25.13.23.62",
"serverIP": "223.67.140.195"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=25.13.23.62 dst=223.67.140.195 protocol=tcp sport=52527 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656678781.817458392 NORDC_MX400_1 l7_firewall src=25.13.23.62 dst=223.67.140.195 protocol=tcp sport=52527 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52527
protocol: 6
streamName: meraki_l7_firewall
clientIP: 25.13.23.62
serverIP: 223.67.140.195 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=105.108.194.127 dst=94.207.201.96 protocol=udp sport=60032 dport=21840 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 21840,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=105.108.194.127 dst=94.207.201.96 protocol=udp sport=60032 dport=21840 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60032,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "105.108.194.127",
"serverIP": "94.207.201.96"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=105.108.194.127 dst=94.207.201.96 protocol=udp sport=60032 dport=21840 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=105.108.194.127 dst=94.207.201.96 protocol=udp sport=60032 dport=21840 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 21840
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60032
protocol: 17
streamName: meraki_l7_firewall
clientIP: 105.108.194.127
serverIP: 94.207.201.96 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=110.55.179.209 dst=249.17.125.133 protocol=udp sport=60032 dport=21840 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 21840,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=110.55.179.209 dst=249.17.125.133 protocol=udp sport=60032 dport=21840 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60032,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "110.55.179.209",
"serverIP": "249.17.125.133"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=110.55.179.209 dst=249.17.125.133 protocol=udp sport=60032 dport=21840 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=110.55.179.209 dst=249.17.125.133 protocol=udp sport=60032 dport=21840 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 21840
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60032
protocol: 17
streamName: meraki_l7_firewall
clientIP: 110.55.179.209
serverIP: 249.17.125.133 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=234.60.114.77 dst=106.75.3.93 protocol=udp sport=60032 dport=21840 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 21840,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=234.60.114.77 dst=106.75.3.93 protocol=udp sport=60032 dport=21840 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60032,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "234.60.114.77",
"serverIP": "106.75.3.93"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=234.60.114.77 dst=106.75.3.93 protocol=udp sport=60032 dport=21840 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=234.60.114.77 dst=106.75.3.93 protocol=udp sport=60032 dport=21840 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 21840
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60032
protocol: 17
streamName: meraki_l7_firewall
clientIP: 234.60.114.77
serverIP: 106.75.3.93 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=29.6.163.83 dst=178.209.52.144 protocol=udp sport=60032 dport=21840 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 21840,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=29.6.163.83 dst=178.209.52.144 protocol=udp sport=60032 dport=21840 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60032,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "29.6.163.83",
"serverIP": "178.209.52.144"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=29.6.163.83 dst=178.209.52.144 protocol=udp sport=60032 dport=21840 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656678785.843813002 NORDC_MX400_1 l7_firewall src=29.6.163.83 dst=178.209.52.144 protocol=udp sport=60032 dport=21840 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 21840
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60032
protocol: 17
streamName: meraki_l7_firewall
clientIP: 29.6.163.83
serverIP: 178.209.52.144 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=236.164.34.236 dst=255.209.131.103 protocol=tcp sport=51371 dport=443 decision=blocked | {
"action": "block",
"clientport": 51371,
"message": "<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=236.164.34.236 dst=255.209.131.103 protocol=tcp sport=51371 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "236.164.34.236",
"serverIP": "255.209.131.103"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=236.164.34.236 dst=255.209.131.103 protocol=tcp sport=51371 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=236.164.34.236 dst=255.209.131.103 protocol=tcp sport=51371 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51371
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 236.164.34.236
serverIP: 255.209.131.103 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=189.159.102.67 dst=145.205.239.213 protocol=tcp sport=51371 dport=443 decision=blocked | {
"action": "block",
"clientport": 51371,
"message": "<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=189.159.102.67 dst=145.205.239.213 protocol=tcp sport=51371 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "189.159.102.67",
"serverIP": "145.205.239.213"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=189.159.102.67 dst=145.205.239.213 protocol=tcp sport=51371 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=189.159.102.67 dst=145.205.239.213 protocol=tcp sport=51371 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51371
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 189.159.102.67
serverIP: 145.205.239.213 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=172.27.72.231 dst=236.109.223.179 protocol=tcp sport=51371 dport=443 decision=blocked | {
"action": "block",
"clientport": 51371,
"message": "<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=172.27.72.231 dst=236.109.223.179 protocol=tcp sport=51371 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "172.27.72.231",
"serverIP": "236.109.223.179"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=172.27.72.231 dst=236.109.223.179 protocol=tcp sport=51371 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=172.27.72.231 dst=236.109.223.179 protocol=tcp sport=51371 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51371
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 172.27.72.231
serverIP: 236.109.223.179 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=229.161.17.77 dst=154.240.120.211 protocol=tcp sport=51371 dport=443 decision=blocked | {
"action": "block",
"clientport": 51371,
"message": "<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=229.161.17.77 dst=154.240.120.211 protocol=tcp sport=51371 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "229.161.17.77",
"serverIP": "154.240.120.211"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=229.161.17.77 dst=154.240.120.211 protocol=tcp sport=51371 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1686678442.574946589 M22_MX67C_Marietta l7_firewall src=229.161.17.77 dst=154.240.120.211 protocol=tcp sport=51371 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51371
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 229.161.17.77
serverIP: 154.240.120.211 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=120.187.27.239 dst=26.178.225.150 protocol=tcp sport=51670 dport=443 decision=blocked | {
"action": "block",
"clientport": 51670,
"message": "<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=120.187.27.239 dst=26.178.225.150 protocol=tcp sport=51670 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "120.187.27.239",
"serverIP": "26.178.225.150"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=120.187.27.239 dst=26.178.225.150 protocol=tcp sport=51670 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=120.187.27.239 dst=26.178.225.150 protocol=tcp sport=51670 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51670
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 120.187.27.239
serverIP: 26.178.225.150 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=29.232.124.132 dst=117.18.106.66 protocol=tcp sport=51670 dport=443 decision=blocked | {
"action": "block",
"clientport": 51670,
"message": "<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=29.232.124.132 dst=117.18.106.66 protocol=tcp sport=51670 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "29.232.124.132",
"serverIP": "117.18.106.66"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=29.232.124.132 dst=117.18.106.66 protocol=tcp sport=51670 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=29.232.124.132 dst=117.18.106.66 protocol=tcp sport=51670 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51670
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 29.232.124.132
serverIP: 117.18.106.66 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=75.57.3.129 dst=118.143.200.59 protocol=tcp sport=51670 dport=443 decision=blocked | {
"action": "block",
"clientport": 51670,
"message": "<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=75.57.3.129 dst=118.143.200.59 protocol=tcp sport=51670 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "75.57.3.129",
"serverIP": "118.143.200.59"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=75.57.3.129 dst=118.143.200.59 protocol=tcp sport=51670 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=75.57.3.129 dst=118.143.200.59 protocol=tcp sport=51670 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51670
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 75.57.3.129
serverIP: 118.143.200.59 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=110.134.200.235 dst=216.16.61.34 protocol=tcp sport=51670 dport=443 decision=blocked | {
"action": "block",
"clientport": 51670,
"message": "<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=110.134.200.235 dst=216.16.61.34 protocol=tcp sport=51670 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "110.134.200.235",
"serverIP": "216.16.61.34"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=110.134.200.235 dst=216.16.61.34 protocol=tcp sport=51670 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1686678442.323211246 NORDC_MX400_1 l7_firewall src=110.134.200.235 dst=216.16.61.34 protocol=tcp sport=51670 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51670
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 110.134.200.235
serverIP: 216.16.61.34 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=138.230.233.235 dst=192.56.157.14 protocol=tcp sport=52414 dport=443 decision=blocked | {
"action": "block",
"clientport": 52414,
"message": "<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=138.230.233.235 dst=192.56.157.14 protocol=tcp sport=52414 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "138.230.233.235",
"serverIP": "192.56.157.14"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=138.230.233.235 dst=192.56.157.14 protocol=tcp sport=52414 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=138.230.233.235 dst=192.56.157.14 protocol=tcp sport=52414 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52414
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 138.230.233.235
serverIP: 192.56.157.14 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=200.159.17.13 dst=185.170.71.89 protocol=tcp sport=52414 dport=443 decision=blocked | {
"action": "block",
"clientport": 52414,
"message": "<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=200.159.17.13 dst=185.170.71.89 protocol=tcp sport=52414 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "200.159.17.13",
"serverIP": "185.170.71.89"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=200.159.17.13 dst=185.170.71.89 protocol=tcp sport=52414 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=200.159.17.13 dst=185.170.71.89 protocol=tcp sport=52414 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52414
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 200.159.17.13
serverIP: 185.170.71.89 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=86.18.78.0 dst=171.165.249.160 protocol=tcp sport=52414 dport=443 decision=blocked | {
"action": "block",
"clientport": 52414,
"message": "<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=86.18.78.0 dst=171.165.249.160 protocol=tcp sport=52414 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "86.18.78.0",
"serverIP": "171.165.249.160"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=86.18.78.0 dst=171.165.249.160 protocol=tcp sport=52414 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=86.18.78.0 dst=171.165.249.160 protocol=tcp sport=52414 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52414
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 86.18.78.0
serverIP: 171.165.249.160 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=115.26.159.68 dst=124.157.113.231 protocol=tcp sport=52414 dport=443 decision=blocked | {
"action": "block",
"clientport": 52414,
"message": "<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=115.26.159.68 dst=124.157.113.231 protocol=tcp sport=52414 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "115.26.159.68",
"serverIP": "124.157.113.231"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=115.26.159.68 dst=124.157.113.231 protocol=tcp sport=52414 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1686670286.863050492 NORDC_MX400_1 l7_firewall src=115.26.159.68 dst=124.157.113.231 protocol=tcp sport=52414 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52414
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 115.26.159.68
serverIP: 124.157.113.231 | Explain this syslog message |
<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=2.146.125.159 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=230.237.171.157 spt=31558 requestMethod=GET app=TLSv1.2 requestContext="-" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.237.171.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 31558,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1702432153137 ",
"message": "<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=2.146.125.159 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=230.237.171.157 spt=31558 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.237.171.157 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:192.155.90.118",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "230.237.171.157",
"serverIP": "2.146.125.159",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=2.146.125.159 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=230.237.171.157 spt=31558 requestMethod=GET app=TLSv1.2 requestContext="-" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.237.171.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=2.146.125.159 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=230.237.171.157 spt=31558 requestMethod=GET app=TLSv1.2 requestContext="-" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.237.171.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 31558
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1702432153137
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:192.155.90.118', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 230.237.171.157
serverIP: 2.146.125.159
userName: - | Explain this syslog message |
<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.148.73.172 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=202.93.119.161 spt=31558 requestMethod=GET app=TLSv1.2 requestContext="-" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=202.93.119.161 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 31558,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1702432153137 ",
"message": "<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.148.73.172 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=202.93.119.161 spt=31558 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=202.93.119.161 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:192.155.90.118",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "202.93.119.161",
"serverIP": "233.148.73.172",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.148.73.172 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=202.93.119.161 spt=31558 requestMethod=GET app=TLSv1.2 requestContext="-" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=202.93.119.161 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.148.73.172 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=202.93.119.161 spt=31558 requestMethod=GET app=TLSv1.2 requestContext="-" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=202.93.119.161 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 31558
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1702432153137
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:192.155.90.118', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 202.93.119.161
serverIP: 233.148.73.172
userName: - | Explain this syslog message |
<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=16.54.99.211 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=57.160.189.190 spt=31558 requestMethod=GET app=TLSv1.2 requestContext="-" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.160.189.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 31558,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1702432153137 ",
"message": "<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=16.54.99.211 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=57.160.189.190 spt=31558 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.160.189.190 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:192.155.90.118",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "57.160.189.190",
"serverIP": "16.54.99.211",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=16.54.99.211 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=57.160.189.190 spt=31558 requestMethod=GET app=TLSv1.2 requestContext="-" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.160.189.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=16.54.99.211 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=57.160.189.190 spt=31558 requestMethod=GET app=TLSv1.2 requestContext="-" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.160.189.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 31558
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1702432153137
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:192.155.90.118', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 57.160.189.190
serverIP: 16.54.99.211
userName: - | Explain this syslog message |
<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=50.90.31.158 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=25.227.172.175 spt=31558 requestMethod=GET app=TLSv1.2 requestContext="-" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.227.172.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 31558,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1702432153137 ",
"message": "<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=50.90.31.158 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=25.227.172.175 spt=31558 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.227.172.175 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:192.155.90.118",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "25.227.172.175",
"serverIP": "50.90.31.158",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=50.90.31.158 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=25.227.172.175 spt=31558 requestMethod=GET app=TLSv1.2 requestContext="-" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.227.172.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 12 19:49:13 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=50.90.31.158 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=25.227.172.175 spt=31558 requestMethod=GET app=TLSv1.2 requestContext="-" start=Dec 12 2023 19:49:13 rt=1702432153137 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18c60dd1e0b-d7d01dce cn2=31558 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.227.172.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 31558
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1702432153137
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:192.155.90.118', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 25.227.172.175
serverIP: 50.90.31.158
userName: - | Explain this syslog message |
<185>Feb 27 16:38:53 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=81.87.25.184 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.75.101.238 spt=60000 requestMethod=GET app=HTTP requestContext="-" start=Feb 27 2023 16:38:53 rt=1677537533057 request=/ requestClientApplication="masscan/1.3 (https://github.com/robertdavidgraham/masscan)" dvchost=WAFirewall externalId=18695075c6b-1061edf5 cn2=60000 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.75.101.238 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:94.102.51.9",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 27 16:38:53 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=81.87.25.184 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=158.75.101.238 spt=60000 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 27 2023 16:38:53 rt=1677537533057 request=/ requestClientApplication=\"masscan/1.3 (https://github.com/robertdavidgraham/masscan)\" dvchost=WAFirewall externalId=18695075c6b-1061edf5 cn2=60000 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.75.101.238 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1677537533057 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 60000,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "158.75.101.238",
"serverIP": "81.87.25.184",
"userName": "-"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.