input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Feb 27 16:38:53 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=81.87.25.184 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.75.101.238 spt=60000 requestMethod=GET app=HTTP requestContext="-" start=Feb 27 2023 16:38:53 rt=1677537533057 request=/ requestClientApplication="masscan/1.3 (https://github.com/robertdavidgraham/masscan)" dvchost=WAFirewall externalId=18695075c6b-1061edf5 cn2=60000 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.75.101.238 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 16:38:53 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=81.87.25.184 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.75.101.238 spt=60000 requestMethod=GET app=HTTP requestContext="-" start=Feb 27 2023 16:38:53 rt=1677537533057 request=/ requestClientApplication="masscan/1.3 (https://github.com/robertdavidgraham/masscan)" dvchost=WAFirewall externalId=18695075c6b-1061edf5 cn2=60000 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.75.101.238 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:94.102.51.9', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1677537533057
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 60000
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 158.75.101.238
serverIP: 81.87.25.184
userName: - | Explain this syslog message |
<185>Feb 27 16:38:53 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=189.219.15.242 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=100.35.150.106 spt=60000 requestMethod=GET app=HTTP requestContext="-" start=Feb 27 2023 16:38:53 rt=1677537533057 request=/ requestClientApplication="masscan/1.3 (https://github.com/robertdavidgraham/masscan)" dvchost=WAFirewall externalId=18695075c6b-1061edf5 cn2=60000 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=100.35.150.106 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:94.102.51.9",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 27 16:38:53 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=189.219.15.242 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=100.35.150.106 spt=60000 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 27 2023 16:38:53 rt=1677537533057 request=/ requestClientApplication=\"masscan/1.3 (https://github.com/robertdavidgraham/masscan)\" dvchost=WAFirewall externalId=18695075c6b-1061edf5 cn2=60000 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=100.35.150.106 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1677537533057 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 60000,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "100.35.150.106",
"serverIP": "189.219.15.242",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 27 16:38:53 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=189.219.15.242 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=100.35.150.106 spt=60000 requestMethod=GET app=HTTP requestContext="-" start=Feb 27 2023 16:38:53 rt=1677537533057 request=/ requestClientApplication="masscan/1.3 (https://github.com/robertdavidgraham/masscan)" dvchost=WAFirewall externalId=18695075c6b-1061edf5 cn2=60000 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=100.35.150.106 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 16:38:53 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=189.219.15.242 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=100.35.150.106 spt=60000 requestMethod=GET app=HTTP requestContext="-" start=Feb 27 2023 16:38:53 rt=1677537533057 request=/ requestClientApplication="masscan/1.3 (https://github.com/robertdavidgraham/masscan)" dvchost=WAFirewall externalId=18695075c6b-1061edf5 cn2=60000 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=100.35.150.106 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:94.102.51.9', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1677537533057
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 60000
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 100.35.150.106
serverIP: 189.219.15.242
userName: - | Explain this syslog message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=7.249.224.147 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=223.147.187.152 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=223.147.187.152 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 47960,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/sslvpn/js/login.js",
"localhostname": "WAFirewall",
"localstarttime": "1709910697192 ",
"message": "<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=7.249.224.147 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=223.147.187.152 spt=47960 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication=\"Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0\" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=223.147.187.152 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:194.156.99.148"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "223.147.187.152",
"serverIP": "7.249.224.147",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=7.249.224.147 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=223.147.187.152 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=223.147.187.152 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=7.249.224.147 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=223.147.187.152 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=223.147.187.152 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47960
facilitycode: 23
facilitylabel: local7
fqdn: /sslvpn/js/login.js
localhostname: WAFirewall
localstarttime: 1709910697192
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:194.156.99.148']
vendorcode: 342
streamName: barracuda_waf
clientIP: 223.147.187.152
serverIP: 7.249.224.147
userName: - | Explain this syslog message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=24.92.121.171 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=7.221.135.50 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.221.135.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 47960,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/sslvpn/js/login.js",
"localhostname": "WAFirewall",
"localstarttime": "1709910697192 ",
"message": "<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=24.92.121.171 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=7.221.135.50 spt=47960 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication=\"Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0\" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.221.135.50 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:194.156.99.148"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "7.221.135.50",
"serverIP": "24.92.121.171",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=24.92.121.171 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=7.221.135.50 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.221.135.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=24.92.121.171 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=7.221.135.50 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.221.135.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47960
facilitycode: 23
facilitylabel: local7
fqdn: /sslvpn/js/login.js
localhostname: WAFirewall
localstarttime: 1709910697192
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:194.156.99.148']
vendorcode: 342
streamName: barracuda_waf
clientIP: 7.221.135.50
serverIP: 24.92.121.171
userName: - | Explain this syslog message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=7.163.244.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=29.98.114.189 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.98.114.189 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 47960,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/sslvpn/js/login.js",
"localhostname": "WAFirewall",
"localstarttime": "1709910697192 ",
"message": "<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=7.163.244.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=29.98.114.189 spt=47960 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication=\"Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0\" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.98.114.189 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:194.156.99.148"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "29.98.114.189",
"serverIP": "7.163.244.97",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=7.163.244.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=29.98.114.189 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.98.114.189 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=7.163.244.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=29.98.114.189 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=29.98.114.189 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47960
facilitycode: 23
facilitylabel: local7
fqdn: /sslvpn/js/login.js
localhostname: WAFirewall
localstarttime: 1709910697192
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:194.156.99.148']
vendorcode: 342
streamName: barracuda_waf
clientIP: 29.98.114.189
serverIP: 7.163.244.97
userName: - | Explain this syslog message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=26.133.0.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=143.222.50.174 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=143.222.50.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 47960,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/sslvpn/js/login.js",
"localhostname": "WAFirewall",
"localstarttime": "1709910697192 ",
"message": "<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=26.133.0.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=143.222.50.174 spt=47960 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication=\"Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0\" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=143.222.50.174 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:194.156.99.148"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "143.222.50.174",
"serverIP": "26.133.0.66",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=26.133.0.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=143.222.50.174 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=143.222.50.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=26.133.0.66 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=143.222.50.174 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=143.222.50.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47960
facilitycode: 23
facilitylabel: local7
fqdn: /sslvpn/js/login.js
localhostname: WAFirewall
localstarttime: 1709910697192
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:194.156.99.148']
vendorcode: 342
streamName: barracuda_waf
clientIP: 143.222.50.174
serverIP: 26.133.0.66
userName: - | Explain this syslog message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.4.212.24 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=92.38.227.219 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=92.38.227.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 47960,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/sslvpn/js/login.js",
"localhostname": "WAFirewall",
"localstarttime": "1709910697192 ",
"message": "<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.4.212.24 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=92.38.227.219 spt=47960 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication=\"Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0\" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=92.38.227.219 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:194.156.99.148"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "92.38.227.219",
"serverIP": "98.4.212.24",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.4.212.24 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=92.38.227.219 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=92.38.227.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.4.212.24 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=92.38.227.219 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=92.38.227.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47960
facilitycode: 23
facilitylabel: local7
fqdn: /sslvpn/js/login.js
localhostname: WAFirewall
localstarttime: 1709910697192
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:194.156.99.148']
vendorcode: 342
streamName: barracuda_waf
clientIP: 92.38.227.219
serverIP: 98.4.212.24
userName: - | Explain this syslog message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.160.140.110 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=133.80.142.9 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.80.142.9 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 47960,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/sslvpn/js/login.js",
"localhostname": "WAFirewall",
"localstarttime": "1709910697192 ",
"message": "<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.160.140.110 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=133.80.142.9 spt=47960 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication=\"Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0\" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.80.142.9 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:194.156.99.148"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "133.80.142.9",
"serverIP": "44.160.140.110",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.160.140.110 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=133.80.142.9 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.80.142.9 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 8 09:11:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.160.140.110 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=133.80.142.9 spt=47960 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 08 2024 09:11:37 rt=1709910697192 request=/sslvpn/js/login.js requestClientApplication="Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.0" dvchost=WAFirewall externalId=18e1e9ea4d7-1c07735a cn2=47960 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=133.80.142.9 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47960
facilitycode: 23
facilitylabel: local7
fqdn: /sslvpn/js/login.js
localhostname: WAFirewall
localstarttime: 1709910697192
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:194.156.99.148']
vendorcode: 342
streamName: barracuda_waf
clientIP: 133.80.142.9
serverIP: 44.160.140.110
userName: - | Explain this syslog message |
<185>Sep 12 21:08:42 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=115.82.81.38 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=108.31.252.56 spt=45982 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 12 2023 21:08:42 rt=1694570922196 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18a8c4c40be-43959d59 cn2=45982 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.31.252.56 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45982,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694570922196 ",
"message": "<185>Sep 12 21:08:42 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=115.82.81.38 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=108.31.252.56 spt=45982 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 12 2023 21:08:42 rt=1694570922196 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=18a8c4c40be-43959d59 cn2=45982 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.31.252.56 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"AttackGroup:Forceful Browsing",
"ProxyIP:69.171.251.3"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "108.31.252.56",
"serverIP": "115.82.81.38",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 12 21:08:42 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=115.82.81.38 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=108.31.252.56 spt=45982 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 12 2023 21:08:42 rt=1694570922196 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18a8c4c40be-43959d59 cn2=45982 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.31.252.56 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 12 21:08:42 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=115.82.81.38 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=108.31.252.56 spt=45982 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 12 2023 21:08:42 rt=1694570922196 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18a8c4c40be-43959d59 cn2=45982 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.31.252.56 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45982
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1694570922196
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'AttackGroup:Forceful Browsing', 'ProxyIP:69.171.251.3']
vendorcode: 342
streamName: barracuda_waf
clientIP: 108.31.252.56
serverIP: 115.82.81.38
userName: - | Explain this syslog message |
<185>Sep 12 21:08:42 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=28.192.20.105 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=96.71.230.37 spt=45982 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 12 2023 21:08:42 rt=1694570922196 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18a8c4c40be-43959d59 cn2=45982 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=96.71.230.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45982,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694570922196 ",
"message": "<185>Sep 12 21:08:42 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=28.192.20.105 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=96.71.230.37 spt=45982 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 12 2023 21:08:42 rt=1694570922196 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=18a8c4c40be-43959d59 cn2=45982 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=96.71.230.37 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"AttackGroup:Forceful Browsing",
"ProxyIP:69.171.251.3"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "96.71.230.37",
"serverIP": "28.192.20.105",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 12 21:08:42 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=28.192.20.105 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=96.71.230.37 spt=45982 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 12 2023 21:08:42 rt=1694570922196 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18a8c4c40be-43959d59 cn2=45982 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=96.71.230.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 12 21:08:42 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=28.192.20.105 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=96.71.230.37 spt=45982 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 12 2023 21:08:42 rt=1694570922196 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18a8c4c40be-43959d59 cn2=45982 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=96.71.230.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45982
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1694570922196
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'AttackGroup:Forceful Browsing', 'ProxyIP:69.171.251.3']
vendorcode: 342
streamName: barracuda_waf
clientIP: 96.71.230.37
serverIP: 28.192.20.105
userName: - | Explain this syslog message |
<185>Sep 12 21:08:42 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.51.78.216 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=225.41.56.187 spt=45982 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 12 2023 21:08:42 rt=1694570922196 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18a8c4c40be-43959d59 cn2=45982 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.41.56.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45982,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1694570922196 ",
"message": "<185>Sep 12 21:08:42 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.51.78.216 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=225.41.56.187 spt=45982 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 12 2023 21:08:42 rt=1694570922196 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=18a8c4c40be-43959d59 cn2=45982 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.41.56.187 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"AttackGroup:Forceful Browsing",
"ProxyIP:69.171.251.3"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "225.41.56.187",
"serverIP": "34.51.78.216",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 12 21:08:42 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.51.78.216 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=225.41.56.187 spt=45982 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 12 2023 21:08:42 rt=1694570922196 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18a8c4c40be-43959d59 cn2=45982 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.41.56.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 12 21:08:42 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.51.78.216 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=225.41.56.187 spt=45982 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 12 2023 21:08:42 rt=1694570922196 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18a8c4c40be-43959d59 cn2=45982 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.41.56.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45982
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1694570922196
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'AttackGroup:Forceful Browsing', 'ProxyIP:69.171.251.3']
vendorcode: 342
streamName: barracuda_waf
clientIP: 225.41.56.187
serverIP: 34.51.78.216
userName: - | Explain this syslog message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=237.22.38.244 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=128.123.148.150 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=128.123.148.150 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53114,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1688011010823 ",
"message": "<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=237.22.38.244 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=128.123.148.150 spt=53114 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=128.123.148.150 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:34.77.127.183"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "128.123.148.150",
"serverIP": "237.22.38.244",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=237.22.38.244 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=128.123.148.150 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=128.123.148.150 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=237.22.38.244 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=128.123.148.150 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=128.123.148.150 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53114
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1688011010823
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:34.77.127.183']
vendorcode: 342
streamName: barracuda_waf
clientIP: 128.123.148.150
serverIP: 237.22.38.244
userName: - | Explain this syslog message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.91.244.81 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.199.197.98 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.199.197.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53114,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1688011010823 ",
"message": "<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.91.244.81 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=255.199.197.98 spt=53114 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.199.197.98 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:34.77.127.183"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "255.199.197.98",
"serverIP": "148.91.244.81",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.91.244.81 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.199.197.98 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.199.197.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.91.244.81 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.199.197.98 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.199.197.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53114
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1688011010823
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:34.77.127.183']
vendorcode: 342
streamName: barracuda_waf
clientIP: 255.199.197.98
serverIP: 148.91.244.81
userName: - | Explain this syslog message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=170.182.77.185 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=172.145.113.25 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=172.145.113.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53114,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1688011010823 ",
"message": "<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=170.182.77.185 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=172.145.113.25 spt=53114 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=172.145.113.25 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:34.77.127.183"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "172.145.113.25",
"serverIP": "170.182.77.185",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=170.182.77.185 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=172.145.113.25 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=172.145.113.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=170.182.77.185 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=172.145.113.25 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=172.145.113.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53114
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1688011010823
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:34.77.127.183']
vendorcode: 342
streamName: barracuda_waf
clientIP: 172.145.113.25
serverIP: 170.182.77.185
userName: - | Explain this syslog message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.0.4.240 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=63.32.40.137 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.32.40.137 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53114,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1688011010823 ",
"message": "<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.0.4.240 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=63.32.40.137 spt=53114 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.32.40.137 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:34.77.127.183"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "63.32.40.137",
"serverIP": "15.0.4.240",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.0.4.240 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=63.32.40.137 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.32.40.137 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=15.0.4.240 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=63.32.40.137 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.32.40.137 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53114
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1688011010823
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:34.77.127.183']
vendorcode: 342
streamName: barracuda_waf
clientIP: 63.32.40.137
serverIP: 15.0.4.240
userName: - | Explain this syslog message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.162.101.172 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=77.37.76.226 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.37.76.226 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53114,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1688011010823 ",
"message": "<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.162.101.172 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=77.37.76.226 spt=53114 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.37.76.226 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:34.77.127.183"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "77.37.76.226",
"serverIP": "175.162.101.172",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.162.101.172 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=77.37.76.226 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.37.76.226 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 28 22:56:50 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.162.101.172 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=77.37.76.226 spt=53114 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jun 28 2023 22:56:50 rt=1688011010823 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=189054bf2d8-e3f1861a cn2=53114 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.37.76.226 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53114
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1688011010823
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:34.77.127.183']
vendorcode: 342
streamName: barracuda_waf
clientIP: 77.37.76.226
serverIP: 175.162.101.172
userName: - | Explain this syslog message |
<185>Jun 16 17:19:18 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=173.251.197.248 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=121.138.54.120 spt=47010 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 16 2024 17:19:18 rt=1718576358675 request=/servlet/eAndar.WebImage requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=190232224bc-f9da46e cn2=47010 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.138.54.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 47010,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/servlet/eAndar.WebImage",
"localhostname": "WAFirewall",
"localstarttime": "1718576358675 ",
"message": "<185>Jun 16 17:19:18 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=173.251.197.248 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=121.138.54.120 spt=47010 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 16 2024 17:19:18 rt=1718576358675 request=/servlet/eAndar.WebImage requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=190232224bc-f9da46e cn2=47010 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.138.54.120 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:173.252.95.5",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "121.138.54.120",
"serverIP": "173.251.197.248",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 16 17:19:18 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=173.251.197.248 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=121.138.54.120 spt=47010 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 16 2024 17:19:18 rt=1718576358675 request=/servlet/eAndar.WebImage requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=190232224bc-f9da46e cn2=47010 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.138.54.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 16 17:19:18 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=173.251.197.248 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=121.138.54.120 spt=47010 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 16 2024 17:19:18 rt=1718576358675 request=/servlet/eAndar.WebImage requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=190232224bc-f9da46e cn2=47010 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.138.54.120 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47010
facilitycode: 23
facilitylabel: local7
fqdn: /servlet/eAndar.WebImage
localhostname: WAFirewall
localstarttime: 1718576358675
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:173.252.95.5', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 121.138.54.120
serverIP: 173.251.197.248
userName: - | Explain this syslog message |
<185>Jun 16 17:19:18 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=127.226.219.42 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=26.33.127.199 spt=47010 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 16 2024 17:19:18 rt=1718576358675 request=/servlet/eAndar.WebImage requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=190232224bc-f9da46e cn2=47010 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.33.127.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 47010,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/servlet/eAndar.WebImage",
"localhostname": "WAFirewall",
"localstarttime": "1718576358675 ",
"message": "<185>Jun 16 17:19:18 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=127.226.219.42 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=26.33.127.199 spt=47010 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 16 2024 17:19:18 rt=1718576358675 request=/servlet/eAndar.WebImage requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=190232224bc-f9da46e cn2=47010 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.33.127.199 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:173.252.95.5",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "26.33.127.199",
"serverIP": "127.226.219.42",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 16 17:19:18 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=127.226.219.42 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=26.33.127.199 spt=47010 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 16 2024 17:19:18 rt=1718576358675 request=/servlet/eAndar.WebImage requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=190232224bc-f9da46e cn2=47010 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.33.127.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 16 17:19:18 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=127.226.219.42 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=26.33.127.199 spt=47010 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 16 2024 17:19:18 rt=1718576358675 request=/servlet/eAndar.WebImage requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=190232224bc-f9da46e cn2=47010 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.33.127.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47010
facilitycode: 23
facilitylabel: local7
fqdn: /servlet/eAndar.WebImage
localhostname: WAFirewall
localstarttime: 1718576358675
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:173.252.95.5', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 26.33.127.199
serverIP: 127.226.219.42
userName: - | Explain this syslog message |
<185>Jun 16 17:19:18 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=118.121.116.162 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=51.58.136.41 spt=47010 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 16 2024 17:19:18 rt=1718576358675 request=/servlet/eAndar.WebImage requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=190232224bc-f9da46e cn2=47010 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.58.136.41 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 47010,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/servlet/eAndar.WebImage",
"localhostname": "WAFirewall",
"localstarttime": "1718576358675 ",
"message": "<185>Jun 16 17:19:18 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=118.121.116.162 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=51.58.136.41 spt=47010 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 16 2024 17:19:18 rt=1718576358675 request=/servlet/eAndar.WebImage requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=190232224bc-f9da46e cn2=47010 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.58.136.41 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:173.252.95.5",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "51.58.136.41",
"serverIP": "118.121.116.162",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 16 17:19:18 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=118.121.116.162 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=51.58.136.41 spt=47010 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 16 2024 17:19:18 rt=1718576358675 request=/servlet/eAndar.WebImage requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=190232224bc-f9da46e cn2=47010 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.58.136.41 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 16 17:19:18 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=118.121.116.162 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=51.58.136.41 spt=47010 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 16 2024 17:19:18 rt=1718576358675 request=/servlet/eAndar.WebImage requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=190232224bc-f9da46e cn2=47010 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.58.136.41 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47010
facilitycode: 23
facilitylabel: local7
fqdn: /servlet/eAndar.WebImage
localhostname: WAFirewall
localstarttime: 1718576358675
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:173.252.95.5', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 51.58.136.41
serverIP: 118.121.116.162
userName: - | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=150.7.72.158 dst=161.137.218.99 protocol=tcp sport=443 dport=37940 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=150.7.72.158 dst=161.137.218.99 protocol=tcp sport=443 dport=37940 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37940,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "161.137.218.99",
"serverIP": "150.7.72.158"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=150.7.72.158 dst=161.137.218.99 protocol=tcp sport=443 dport=37940 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=150.7.72.158 dst=161.137.218.99 protocol=tcp sport=443 dport=37940 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37940
protocol: 6
streamName: meraki_l7_firewall
clientIP: 161.137.218.99
serverIP: 150.7.72.158 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=96.36.104.187 dst=60.221.199.208 protocol=tcp sport=443 dport=37940 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=96.36.104.187 dst=60.221.199.208 protocol=tcp sport=443 dport=37940 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37940,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "60.221.199.208",
"serverIP": "96.36.104.187"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=96.36.104.187 dst=60.221.199.208 protocol=tcp sport=443 dport=37940 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=96.36.104.187 dst=60.221.199.208 protocol=tcp sport=443 dport=37940 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37940
protocol: 6
streamName: meraki_l7_firewall
clientIP: 60.221.199.208
serverIP: 96.36.104.187 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=115.137.182.147 dst=187.128.14.212 protocol=tcp sport=443 dport=37940 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=115.137.182.147 dst=187.128.14.212 protocol=tcp sport=443 dport=37940 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37940,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "187.128.14.212",
"serverIP": "115.137.182.147"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=115.137.182.147 dst=187.128.14.212 protocol=tcp sport=443 dport=37940 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=115.137.182.147 dst=187.128.14.212 protocol=tcp sport=443 dport=37940 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37940
protocol: 6
streamName: meraki_l7_firewall
clientIP: 187.128.14.212
serverIP: 115.137.182.147 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=152.131.195.48 dst=222.223.42.146 protocol=tcp sport=443 dport=37940 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=152.131.195.48 dst=222.223.42.146 protocol=tcp sport=443 dport=37940 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37940,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "222.223.42.146",
"serverIP": "152.131.195.48"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=152.131.195.48 dst=222.223.42.146 protocol=tcp sport=443 dport=37940 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674800979.780345764 NORDC_MX400_1 l7_firewall src=152.131.195.48 dst=222.223.42.146 protocol=tcp sport=443 dport=37940 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37940
protocol: 6
streamName: meraki_l7_firewall
clientIP: 222.223.42.146
serverIP: 152.131.195.48 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=40.207.137.108 dst=217.132.20.228 protocol=tcp sport=57428 dport=445 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 445,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=40.207.137.108 dst=217.132.20.228 protocol=tcp sport=57428 dport=445 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57428,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "40.207.137.108",
"serverIP": "217.132.20.228"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=40.207.137.108 dst=217.132.20.228 protocol=tcp sport=57428 dport=445 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=40.207.137.108 dst=217.132.20.228 protocol=tcp sport=57428 dport=445 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 445
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57428
protocol: 6
streamName: meraki_l7_firewall
clientIP: 40.207.137.108
serverIP: 217.132.20.228 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=198.172.14.230 dst=14.244.147.108 protocol=tcp sport=57428 dport=445 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 445,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=198.172.14.230 dst=14.244.147.108 protocol=tcp sport=57428 dport=445 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57428,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "198.172.14.230",
"serverIP": "14.244.147.108"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=198.172.14.230 dst=14.244.147.108 protocol=tcp sport=57428 dport=445 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=198.172.14.230 dst=14.244.147.108 protocol=tcp sport=57428 dport=445 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 445
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57428
protocol: 6
streamName: meraki_l7_firewall
clientIP: 198.172.14.230
serverIP: 14.244.147.108 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=36.94.9.232 dst=228.23.243.121 protocol=tcp sport=57428 dport=445 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 445,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=36.94.9.232 dst=228.23.243.121 protocol=tcp sport=57428 dport=445 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57428,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "36.94.9.232",
"serverIP": "228.23.243.121"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=36.94.9.232 dst=228.23.243.121 protocol=tcp sport=57428 dport=445 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=36.94.9.232 dst=228.23.243.121 protocol=tcp sport=57428 dport=445 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 445
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57428
protocol: 6
streamName: meraki_l7_firewall
clientIP: 36.94.9.232
serverIP: 228.23.243.121 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=111.120.22.32 dst=146.178.227.230 protocol=tcp sport=57428 dport=445 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 445,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=111.120.22.32 dst=146.178.227.230 protocol=tcp sport=57428 dport=445 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57428,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "111.120.22.32",
"serverIP": "146.178.227.230"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=111.120.22.32 dst=146.178.227.230 protocol=tcp sport=57428 dport=445 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1674800981.500031823 M61_MX67C_Savannah l7_firewall src=111.120.22.32 dst=146.178.227.230 protocol=tcp sport=57428 dport=445 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 445
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57428
protocol: 6
streamName: meraki_l7_firewall
clientIP: 111.120.22.32
serverIP: 146.178.227.230 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=100.154.76.91 dst=143.163.165.154 protocol=udp sport=49297 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=100.154.76.91 dst=143.163.165.154 protocol=udp sport=49297 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49297,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "100.154.76.91",
"serverIP": "143.163.165.154"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=100.154.76.91 dst=143.163.165.154 protocol=udp sport=49297 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=100.154.76.91 dst=143.163.165.154 protocol=udp sport=49297 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49297
protocol: 17
streamName: meraki_l7_firewall
clientIP: 100.154.76.91
serverIP: 143.163.165.154 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=210.5.218.158 dst=87.74.154.248 protocol=udp sport=49297 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=210.5.218.158 dst=87.74.154.248 protocol=udp sport=49297 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49297,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "210.5.218.158",
"serverIP": "87.74.154.248"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=210.5.218.158 dst=87.74.154.248 protocol=udp sport=49297 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=210.5.218.158 dst=87.74.154.248 protocol=udp sport=49297 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49297
protocol: 17
streamName: meraki_l7_firewall
clientIP: 210.5.218.158
serverIP: 87.74.154.248 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=219.252.62.17 dst=185.241.34.5 protocol=udp sport=49297 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=219.252.62.17 dst=185.241.34.5 protocol=udp sport=49297 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49297,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "219.252.62.17",
"serverIP": "185.241.34.5"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=219.252.62.17 dst=185.241.34.5 protocol=udp sport=49297 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=219.252.62.17 dst=185.241.34.5 protocol=udp sport=49297 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49297
protocol: 17
streamName: meraki_l7_firewall
clientIP: 219.252.62.17
serverIP: 185.241.34.5 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=237.208.129.31 dst=115.25.209.229 protocol=udp sport=49297 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=237.208.129.31 dst=115.25.209.229 protocol=udp sport=49297 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49297,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "237.208.129.31",
"serverIP": "115.25.209.229"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=237.208.129.31 dst=115.25.209.229 protocol=udp sport=49297 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674800976.066631573 NORDC_MX400_1 l7_firewall src=237.208.129.31 dst=115.25.209.229 protocol=udp sport=49297 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49297
protocol: 17
streamName: meraki_l7_firewall
clientIP: 237.208.129.31
serverIP: 115.25.209.229 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674800992.719752670 NORDC_MX400_1 l7_firewall src=9.98.99.243 dst=116.242.200.245 protocol=udp sport=43996 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674800992.719752670 NORDC_MX400_1 l7_firewall src=9.98.99.243 dst=116.242.200.245 protocol=udp sport=43996 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 43996,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "9.98.99.243",
"serverIP": "116.242.200.245"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674800992.719752670 NORDC_MX400_1 l7_firewall src=9.98.99.243 dst=116.242.200.245 protocol=udp sport=43996 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674800992.719752670 NORDC_MX400_1 l7_firewall src=9.98.99.243 dst=116.242.200.245 protocol=udp sport=43996 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 43996
protocol: 17
streamName: meraki_l7_firewall
clientIP: 9.98.99.243
serverIP: 116.242.200.245 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674800992.719752670 NORDC_MX400_1 l7_firewall src=229.49.208.47 dst=46.192.90.9 protocol=udp sport=43996 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674800992.719752670 NORDC_MX400_1 l7_firewall src=229.49.208.47 dst=46.192.90.9 protocol=udp sport=43996 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 43996,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "229.49.208.47",
"serverIP": "46.192.90.9"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674800992.719752670 NORDC_MX400_1 l7_firewall src=229.49.208.47 dst=46.192.90.9 protocol=udp sport=43996 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1674800992.719752670 NORDC_MX400_1 l7_firewall src=229.49.208.47 dst=46.192.90.9 protocol=udp sport=43996 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 43996
protocol: 17
streamName: meraki_l7_firewall
clientIP: 229.49.208.47
serverIP: 46.192.90.9 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1674800992.719752670 NORDC_MX400_1 l7_firewall src=121.112.49.138 dst=56.15.120.166 protocol=udp sport=43996 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1674800992.719752670 NORDC_MX400_1 l7_firewall src=121.112.49.138 dst=56.15.120.166 protocol=udp sport=43996 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 43996,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "121.112.49.138",
"serverIP": "56.15.120.166"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1674800992.719752670 NORDC_MX400_1 l7_firewall src=121.112.49.138 dst=56.15.120.166 protocol=udp sport=43996 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.