input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=237.13.227.132 dst=232.104.4.206 protocol=tcp sport=51398 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=237.13.227.132 dst=232.104.4.206 protocol=tcp sport=51398 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51398
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 237.13.227.132
serverIP: 232.104.4.206 | Explain this syslog message |
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=94.81.7.67 dst=226.143.178.179 protocol=tcp sport=51398 dport=443 decision=blocked | {
"action": "block",
"clientport": 51398,
"message": "<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=94.81.7.67 dst=226.143.178.179 protocol=tcp sport=51398 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "94.81.7.67",
"serverIP": "226.143.178.179"
} | Create a JSON artifact from the message |
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=94.81.7.67 dst=226.143.178.179 protocol=tcp sport=51398 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=94.81.7.67 dst=226.143.178.179 protocol=tcp sport=51398 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51398
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 94.81.7.67
serverIP: 226.143.178.179 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=194.14.161.36 dst=187.95.117.72 protocol=tcp sport=54002 dport=443 decision=blocked | {
"action": "block",
"clientport": 54002,
"message": "<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=194.14.161.36 dst=187.95.117.72 protocol=tcp sport=54002 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "194.14.161.36",
"serverIP": "187.95.117.72"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=194.14.161.36 dst=187.95.117.72 protocol=tcp sport=54002 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=194.14.161.36 dst=187.95.117.72 protocol=tcp sport=54002 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54002
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 194.14.161.36
serverIP: 187.95.117.72 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=100.164.24.182 dst=126.146.76.21 protocol=tcp sport=54002 dport=443 decision=blocked | {
"action": "block",
"clientport": 54002,
"message": "<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=100.164.24.182 dst=126.146.76.21 protocol=tcp sport=54002 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "100.164.24.182",
"serverIP": "126.146.76.21"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=100.164.24.182 dst=126.146.76.21 protocol=tcp sport=54002 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=100.164.24.182 dst=126.146.76.21 protocol=tcp sport=54002 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54002
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 100.164.24.182
serverIP: 126.146.76.21 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=190.133.213.23 dst=45.181.238.82 protocol=tcp sport=54002 dport=443 decision=blocked | {
"action": "block",
"clientport": 54002,
"message": "<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=190.133.213.23 dst=45.181.238.82 protocol=tcp sport=54002 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "190.133.213.23",
"serverIP": "45.181.238.82"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=190.133.213.23 dst=45.181.238.82 protocol=tcp sport=54002 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=190.133.213.23 dst=45.181.238.82 protocol=tcp sport=54002 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54002
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 190.133.213.23
serverIP: 45.181.238.82 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=20.233.193.157 dst=126.141.76.226 protocol=tcp sport=54002 dport=443 decision=blocked | {
"action": "block",
"clientport": 54002,
"message": "<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=20.233.193.157 dst=126.141.76.226 protocol=tcp sport=54002 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "20.233.193.157",
"serverIP": "126.141.76.226"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=20.233.193.157 dst=126.141.76.226 protocol=tcp sport=54002 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1691048642.634438930 M34_MX67C_Atlanta l7_firewall src=20.233.193.157 dst=126.141.76.226 protocol=tcp sport=54002 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54002
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 20.233.193.157
serverIP: 126.141.76.226 | Explain this syslog message |
Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for alice from 148.42.244.110 port 52622 ssh2 | {
"clientport": 52622,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "oakrhelv007",
"localstarttime": "Jun 14 02:33:57",
"message": "Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for alice from 148.42.244.110 port 52622 ssh2",
"messagetype": "auth_failure",
"pid": 18461,
"priority": 13,
"productids": [
6
],
"program": "sshd",
"senderhost": "oakrhelv007.achn.net",
"sensitivity": "normal",
"severitycode": 5,
"severitylabel": "notice",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"sshd",
"auth_failure"
],
"streamName": "sshd",
"clientIP": "148.42.244.110",
"userName": "alice"
} | Create a JSON artifact from the message |
Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for alice from 148.42.244.110 port 52622 ssh2 | Product: sshd
Vendor: sshd | Identify this syslog message |
Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for alice from 148.42.244.110 port 52622 ssh2 | This is a syslog message from a product called sshd by sshd. The following fields were extracted from the message:
clientport: 52622
facilitycode: 1
facilitylabel: user-level
localhostname: oakrhelv007
localstarttime: Jun 14 02:33:57
messagetype: auth_failure
pid: 18461
priority: 13
productids: [6]
program: sshd
senderhost: oakrhelv007.achn.net
sensitivity: normal
severitycode: 5
severitylabel: notice
sourceinfo: unknown
tags: ['rfc3164', 'sshd', 'auth_failure']
streamName: sshd
clientIP: 148.42.244.110
userName: alice | Explain this syslog message |
Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for charlie from 188.186.32.33 port 52622 ssh2 | {
"clientport": 52622,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "oakrhelv007",
"localstarttime": "Jun 14 02:33:57",
"message": "Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for charlie from 188.186.32.33 port 52622 ssh2",
"messagetype": "auth_failure",
"pid": 18461,
"priority": 13,
"productids": [
6
],
"program": "sshd",
"senderhost": "oakrhelv007.achn.net",
"sensitivity": "normal",
"severitycode": 5,
"severitylabel": "notice",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"sshd",
"auth_failure"
],
"streamName": "sshd",
"clientIP": "188.186.32.33",
"userName": "charlie"
} | Create a JSON artifact from the message |
Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for charlie from 188.186.32.33 port 52622 ssh2 | Product: sshd
Vendor: sshd | Identify this syslog message |
Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for charlie from 188.186.32.33 port 52622 ssh2 | This is a syslog message from a product called sshd by sshd. The following fields were extracted from the message:
clientport: 52622
facilitycode: 1
facilitylabel: user-level
localhostname: oakrhelv007
localstarttime: Jun 14 02:33:57
messagetype: auth_failure
pid: 18461
priority: 13
productids: [6]
program: sshd
senderhost: oakrhelv007.achn.net
sensitivity: normal
severitycode: 5
severitylabel: notice
sourceinfo: unknown
tags: ['rfc3164', 'sshd', 'auth_failure']
streamName: sshd
clientIP: 188.186.32.33
userName: charlie | Explain this syslog message |
Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for bob from 176.168.42.58 port 52622 ssh2 | {
"clientport": 52622,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "oakrhelv007",
"localstarttime": "Jun 14 02:33:57",
"message": "Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for bob from 176.168.42.58 port 52622 ssh2",
"messagetype": "auth_failure",
"pid": 18461,
"priority": 13,
"productids": [
6
],
"program": "sshd",
"senderhost": "oakrhelv007.achn.net",
"sensitivity": "normal",
"severitycode": 5,
"severitylabel": "notice",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"sshd",
"auth_failure"
],
"streamName": "sshd",
"clientIP": "176.168.42.58",
"userName": "bob"
} | Create a JSON artifact from the message |
Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for bob from 176.168.42.58 port 52622 ssh2 | Product: sshd
Vendor: sshd | Identify this syslog message |
Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for bob from 176.168.42.58 port 52622 ssh2 | This is a syslog message from a product called sshd by sshd. The following fields were extracted from the message:
clientport: 52622
facilitycode: 1
facilitylabel: user-level
localhostname: oakrhelv007
localstarttime: Jun 14 02:33:57
messagetype: auth_failure
pid: 18461
priority: 13
productids: [6]
program: sshd
senderhost: oakrhelv007.achn.net
sensitivity: normal
severitycode: 5
severitylabel: notice
sourceinfo: unknown
tags: ['rfc3164', 'sshd', 'auth_failure']
streamName: sshd
clientIP: 176.168.42.58
userName: bob | Explain this syslog message |
Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for janedoe from 130.93.20.193 port 52622 ssh2 | {
"clientport": 52622,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "oakrhelv007",
"localstarttime": "Jun 14 02:33:57",
"message": "Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for janedoe from 130.93.20.193 port 52622 ssh2",
"messagetype": "auth_failure",
"pid": 18461,
"priority": 13,
"productids": [
6
],
"program": "sshd",
"senderhost": "oakrhelv007.achn.net",
"sensitivity": "normal",
"severitycode": 5,
"severitylabel": "notice",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"sshd",
"auth_failure"
],
"streamName": "sshd",
"clientIP": "130.93.20.193",
"userName": "janedoe"
} | Create a JSON artifact from the message |
Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for janedoe from 130.93.20.193 port 52622 ssh2 | Product: sshd
Vendor: sshd | Identify this syslog message |
Jun 14 02:33:57 oakrhelv007 sshd[18461]: Failed password for janedoe from 130.93.20.193 port 52622 ssh2 | This is a syslog message from a product called sshd by sshd. The following fields were extracted from the message:
clientport: 52622
facilitycode: 1
facilitylabel: user-level
localhostname: oakrhelv007
localstarttime: Jun 14 02:33:57
messagetype: auth_failure
pid: 18461
priority: 13
productids: [6]
program: sshd
senderhost: oakrhelv007.achn.net
sensitivity: normal
severitycode: 5
severitylabel: notice
sourceinfo: unknown
tags: ['rfc3164', 'sshd', 'auth_failure']
streamName: sshd
clientIP: 130.93.20.193
userName: janedoe | Explain this syslog message |
<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=252.132.63.131 dst=110.98.64.100 protocol=tcp sport=55413 dport=443 decision=blocked | {
"action": "block",
"clientport": 55413,
"message": "<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=252.132.63.131 dst=110.98.64.100 protocol=tcp sport=55413 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "252.132.63.131",
"serverIP": "110.98.64.100"
} | Create a JSON artifact from the message |
<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=252.132.63.131 dst=110.98.64.100 protocol=tcp sport=55413 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=252.132.63.131 dst=110.98.64.100 protocol=tcp sport=55413 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55413
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 252.132.63.131
serverIP: 110.98.64.100 | Explain this syslog message |
<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=217.3.109.148 dst=104.237.17.31 protocol=tcp sport=55413 dport=443 decision=blocked | {
"action": "block",
"clientport": 55413,
"message": "<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=217.3.109.148 dst=104.237.17.31 protocol=tcp sport=55413 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "217.3.109.148",
"serverIP": "104.237.17.31"
} | Create a JSON artifact from the message |
<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=217.3.109.148 dst=104.237.17.31 protocol=tcp sport=55413 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=217.3.109.148 dst=104.237.17.31 protocol=tcp sport=55413 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55413
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 217.3.109.148
serverIP: 104.237.17.31 | Explain this syslog message |
<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=8.171.26.55 dst=189.38.34.120 protocol=tcp sport=55413 dport=443 decision=blocked | {
"action": "block",
"clientport": 55413,
"message": "<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=8.171.26.55 dst=189.38.34.120 protocol=tcp sport=55413 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "8.171.26.55",
"serverIP": "189.38.34.120"
} | Create a JSON artifact from the message |
<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=8.171.26.55 dst=189.38.34.120 protocol=tcp sport=55413 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=8.171.26.55 dst=189.38.34.120 protocol=tcp sport=55413 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55413
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 8.171.26.55
serverIP: 189.38.34.120 | Explain this syslog message |
<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=234.237.124.114 dst=194.96.203.33 protocol=tcp sport=55413 dport=443 decision=blocked | {
"action": "block",
"clientport": 55413,
"message": "<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=234.237.124.114 dst=194.96.203.33 protocol=tcp sport=55413 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "234.237.124.114",
"serverIP": "194.96.203.33"
} | Create a JSON artifact from the message |
<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=234.237.124.114 dst=194.96.203.33 protocol=tcp sport=55413 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.242.154.73 1 1691416107.675795595 M54_MX67C_Dothan l7_firewall src=234.237.124.114 dst=194.96.203.33 protocol=tcp sport=55413 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55413
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 234.237.124.114
serverIP: 194.96.203.33 | Explain this syslog message |
<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=159.87.112.140 dst=57.235.159.2 protocol=udp sport=36233 dport=53 decision=blocked | {
"action": "block",
"clientport": 36233,
"message": "<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=159.87.112.140 dst=57.235.159.2 protocol=udp sport=36233 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "159.87.112.140",
"serverIP": "57.235.159.2"
} | Create a JSON artifact from the message |
<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=159.87.112.140 dst=57.235.159.2 protocol=udp sport=36233 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=159.87.112.140 dst=57.235.159.2 protocol=udp sport=36233 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 36233
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 159.87.112.140
serverIP: 57.235.159.2 | Explain this syslog message |
<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=174.44.45.20 dst=223.29.81.48 protocol=udp sport=36233 dport=53 decision=blocked | {
"action": "block",
"clientport": 36233,
"message": "<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=174.44.45.20 dst=223.29.81.48 protocol=udp sport=36233 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "174.44.45.20",
"serverIP": "223.29.81.48"
} | Create a JSON artifact from the message |
<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=174.44.45.20 dst=223.29.81.48 protocol=udp sport=36233 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=174.44.45.20 dst=223.29.81.48 protocol=udp sport=36233 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 36233
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 174.44.45.20
serverIP: 223.29.81.48 | Explain this syslog message |
<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=41.250.228.80 dst=65.61.36.205 protocol=udp sport=36233 dport=53 decision=blocked | {
"action": "block",
"clientport": 36233,
"message": "<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=41.250.228.80 dst=65.61.36.205 protocol=udp sport=36233 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "41.250.228.80",
"serverIP": "65.61.36.205"
} | Create a JSON artifact from the message |
<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=41.250.228.80 dst=65.61.36.205 protocol=udp sport=36233 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=41.250.228.80 dst=65.61.36.205 protocol=udp sport=36233 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 36233
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 41.250.228.80
serverIP: 65.61.36.205 | Explain this syslog message |
<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=122.254.3.127 dst=30.149.238.82 protocol=udp sport=36233 dport=53 decision=blocked | {
"action": "block",
"clientport": 36233,
"message": "<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=122.254.3.127 dst=30.149.238.82 protocol=udp sport=36233 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "122.254.3.127",
"serverIP": "30.149.238.82"
} | Create a JSON artifact from the message |
<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=122.254.3.127 dst=30.149.238.82 protocol=udp sport=36233 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.76.5.213 1 1691501300.075387510 M51_MX67C_Mobile l7_firewall src=122.254.3.127 dst=30.149.238.82 protocol=udp sport=36233 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 36233
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 122.254.3.127
serverIP: 30.149.238.82 | Explain this syslog message |
<185>Aug 7 20:30:34 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=186.63.182.109 dpt=80 act=DENY msg=[] duser="-" src=163.28.238.92 spt=62230 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 20:30:34 rt=1691458234548 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d2c468b4-ea9d0400 cn2=62230 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=163.28.238.92 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 62230,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1691458234548 ",
"message": "<185>Aug 7 20:30:34 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=186.63.182.109 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=163.28.238.92 spt=62230 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Aug 07 2023 20:30:34 rt=1691458234548 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=189d2c468b4-ea9d0400 cn2=62230 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=163.28.238.92 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:198.235.24.109",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "163.28.238.92",
"serverIP": "186.63.182.109",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 7 20:30:34 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=186.63.182.109 dpt=80 act=DENY msg=[] duser="-" src=163.28.238.92 spt=62230 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 20:30:34 rt=1691458234548 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d2c468b4-ea9d0400 cn2=62230 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=163.28.238.92 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 7 20:30:34 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=186.63.182.109 dpt=80 act=DENY msg=[] duser="-" src=163.28.238.92 spt=62230 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 20:30:34 rt=1691458234548 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d2c468b4-ea9d0400 cn2=62230 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=163.28.238.92 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 62230
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1691458234548
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:198.235.24.109', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 163.28.238.92
serverIP: 186.63.182.109
userName: - | Explain this syslog message |
<185>Aug 7 20:30:34 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=165.215.45.96 dpt=80 act=DENY msg=[] duser="-" src=116.53.128.127 spt=62230 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 20:30:34 rt=1691458234548 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d2c468b4-ea9d0400 cn2=62230 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=116.53.128.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 62230,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1691458234548 ",
"message": "<185>Aug 7 20:30:34 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=165.215.45.96 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=116.53.128.127 spt=62230 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Aug 07 2023 20:30:34 rt=1691458234548 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=189d2c468b4-ea9d0400 cn2=62230 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=116.53.128.127 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:198.235.24.109",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "116.53.128.127",
"serverIP": "165.215.45.96",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 7 20:30:34 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=165.215.45.96 dpt=80 act=DENY msg=[] duser="-" src=116.53.128.127 spt=62230 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 20:30:34 rt=1691458234548 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d2c468b4-ea9d0400 cn2=62230 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=116.53.128.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 7 20:30:34 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=165.215.45.96 dpt=80 act=DENY msg=[] duser="-" src=116.53.128.127 spt=62230 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 20:30:34 rt=1691458234548 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d2c468b4-ea9d0400 cn2=62230 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=116.53.128.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 62230
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1691458234548
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:198.235.24.109', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 116.53.128.127
serverIP: 165.215.45.96
userName: - | Explain this syslog message |
<185>Aug 7 20:30:34 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=188.110.99.47 dpt=80 act=DENY msg=[] duser="-" src=172.145.125.248 spt=62230 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 20:30:34 rt=1691458234548 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d2c468b4-ea9d0400 cn2=62230 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=172.145.125.248 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 62230,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1691458234548 ",
"message": "<185>Aug 7 20:30:34 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=188.110.99.47 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=172.145.125.248 spt=62230 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Aug 07 2023 20:30:34 rt=1691458234548 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=189d2c468b4-ea9d0400 cn2=62230 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=172.145.125.248 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:198.235.24.109",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "172.145.125.248",
"serverIP": "188.110.99.47",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 7 20:30:34 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=188.110.99.47 dpt=80 act=DENY msg=[] duser="-" src=172.145.125.248 spt=62230 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 20:30:34 rt=1691458234548 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d2c468b4-ea9d0400 cn2=62230 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=172.145.125.248 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 7 20:30:34 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=188.110.99.47 dpt=80 act=DENY msg=[] duser="-" src=172.145.125.248 spt=62230 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 20:30:34 rt=1691458234548 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d2c468b4-ea9d0400 cn2=62230 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=172.145.125.248 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 62230
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1691458234548
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:198.235.24.109', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 172.145.125.248
serverIP: 188.110.99.47
userName: - | Explain this syslog message |
<185>Aug 7 22:57:58 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=139.172.21.61 dpt=80 act=DENY msg=[�] duser="-" src=28.207.49.158 spt=3686 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 22:57:58 rt=1691467078319 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d34b5aaf-e699c5c4 cn2=3686 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=28.207.49.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 3686,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1691467078319 ",
"message": "<185>Aug 7 22:57:58 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=139.172.21.61 dpt=80 act=DENY msg=[\u0016\u0003\u0001\u0001\ufffd\u0001] duser=\"-\" src=28.207.49.158 spt=3686 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Aug 07 2023 22:57:58 rt=1691467078319 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=189d34b5aaf-e699c5c4 cn2=3686 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=28.207.49.158 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:142.93.41.199",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "28.207.49.158",
"serverIP": "139.172.21.61",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 7 22:57:58 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=139.172.21.61 dpt=80 act=DENY msg=[�] duser="-" src=28.207.49.158 spt=3686 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 22:57:58 rt=1691467078319 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d34b5aaf-e699c5c4 cn2=3686 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=28.207.49.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 7 22:57:58 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=139.172.21.61 dpt=80 act=DENY msg=[�] duser="-" src=28.207.49.158 spt=3686 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 22:57:58 rt=1691467078319 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d34b5aaf-e699c5c4 cn2=3686 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=28.207.49.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 3686
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1691467078319
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:142.93.41.199', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 28.207.49.158
serverIP: 139.172.21.61
userName: - | Explain this syslog message |
<185>Aug 7 22:57:58 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=43.172.89.22 dpt=80 act=DENY msg=[�] duser="-" src=33.109.149.35 spt=3686 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 22:57:58 rt=1691467078319 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d34b5aaf-e699c5c4 cn2=3686 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=33.109.149.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 3686,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1691467078319 ",
"message": "<185>Aug 7 22:57:58 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=43.172.89.22 dpt=80 act=DENY msg=[\u0016\u0003\u0001\u0001\ufffd\u0001] duser=\"-\" src=33.109.149.35 spt=3686 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Aug 07 2023 22:57:58 rt=1691467078319 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=189d34b5aaf-e699c5c4 cn2=3686 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=33.109.149.35 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:142.93.41.199",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "33.109.149.35",
"serverIP": "43.172.89.22",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 7 22:57:58 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=43.172.89.22 dpt=80 act=DENY msg=[�] duser="-" src=33.109.149.35 spt=3686 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 22:57:58 rt=1691467078319 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d34b5aaf-e699c5c4 cn2=3686 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=33.109.149.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 7 22:57:58 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=43.172.89.22 dpt=80 act=DENY msg=[�] duser="-" src=33.109.149.35 spt=3686 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 22:57:58 rt=1691467078319 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d34b5aaf-e699c5c4 cn2=3686 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=33.109.149.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 3686
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1691467078319
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:142.93.41.199', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 33.109.149.35
serverIP: 43.172.89.22
userName: - | Explain this syslog message |
<185>Aug 7 22:57:58 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=188.141.9.31 dpt=80 act=DENY msg=[�] duser="-" src=180.196.13.195 spt=3686 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 22:57:58 rt=1691467078319 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d34b5aaf-e699c5c4 cn2=3686 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=180.196.13.195 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 3686,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1691467078319 ",
"message": "<185>Aug 7 22:57:58 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=188.141.9.31 dpt=80 act=DENY msg=[\u0016\u0003\u0001\u0001\ufffd\u0001] duser=\"-\" src=180.196.13.195 spt=3686 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Aug 07 2023 22:57:58 rt=1691467078319 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=189d34b5aaf-e699c5c4 cn2=3686 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=180.196.13.195 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "INVALID_METHOD",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"ProxyIP:142.93.41.199",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"vendorcode": "118",
"streamName": "barracuda_waf",
"clientIP": "180.196.13.195",
"serverIP": "188.141.9.31",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 7 22:57:58 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=188.141.9.31 dpt=80 act=DENY msg=[�] duser="-" src=180.196.13.195 spt=3686 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 22:57:58 rt=1691467078319 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d34b5aaf-e699c5c4 cn2=3686 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=180.196.13.195 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 7 22:57:58 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=188.141.9.31 dpt=80 act=DENY msg=[�] duser="-" src=180.196.13.195 spt=3686 requestMethod="-" app=HTTP requestContext="-" start=Aug 07 2023 22:57:58 rt=1691467078319 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d34b5aaf-e699c5c4 cn2=3686 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=180.196.13.195 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 3686
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1691467078319
messagetype: INVALID_METHOD
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'ProxyIP:142.93.41.199', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
vendorcode: 118
streamName: barracuda_waf
clientIP: 180.196.13.195
serverIP: 188.141.9.31
userName: - | Explain this syslog message |
<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=201.31.13.230 dst=69.189.13.192 protocol=tcp sport=58231 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=201.31.13.230 dst=69.189.13.192 protocol=tcp sport=58231 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58231,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "201.31.13.230",
"serverIP": "69.189.13.192"
} | Create a JSON artifact from the message |
<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=201.31.13.230 dst=69.189.13.192 protocol=tcp sport=58231 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=201.31.13.230 dst=69.189.13.192 protocol=tcp sport=58231 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58231
protocol: 6
streamName: meraki_l7_firewall
clientIP: 201.31.13.230
serverIP: 69.189.13.192 | Explain this syslog message |
<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=22.117.5.187 dst=67.240.20.96 protocol=tcp sport=58231 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=22.117.5.187 dst=67.240.20.96 protocol=tcp sport=58231 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58231,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "22.117.5.187",
"serverIP": "67.240.20.96"
} | Create a JSON artifact from the message |
<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=22.117.5.187 dst=67.240.20.96 protocol=tcp sport=58231 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=22.117.5.187 dst=67.240.20.96 protocol=tcp sport=58231 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58231
protocol: 6
streamName: meraki_l7_firewall
clientIP: 22.117.5.187
serverIP: 67.240.20.96 | Explain this syslog message |
<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=80.96.135.160 dst=88.43.103.237 protocol=tcp sport=58231 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=80.96.135.160 dst=88.43.103.237 protocol=tcp sport=58231 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58231,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "80.96.135.160",
"serverIP": "88.43.103.237"
} | Create a JSON artifact from the message |
<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=80.96.135.160 dst=88.43.103.237 protocol=tcp sport=58231 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=80.96.135.160 dst=88.43.103.237 protocol=tcp sport=58231 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58231
protocol: 6
streamName: meraki_l7_firewall
clientIP: 80.96.135.160
serverIP: 88.43.103.237 | Explain this syslog message |
<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=162.58.48.242 dst=51.25.219.154 protocol=tcp sport=58231 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=162.58.48.242 dst=51.25.219.154 protocol=tcp sport=58231 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58231,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "162.58.48.242",
"serverIP": "51.25.219.154"
} | Create a JSON artifact from the message |
<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=162.58.48.242 dst=51.25.219.154 protocol=tcp sport=58231 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.193.162.129 1 1655118208.031606168 M73_MX67C_Brunswick l7_firewall src=162.58.48.242 dst=51.25.219.154 protocol=tcp sport=58231 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58231
protocol: 6
streamName: meraki_l7_firewall
clientIP: 162.58.48.242
serverIP: 51.25.219.154 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=236.36.182.44 dst=45.153.183.27 protocol=udp sport=40498 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=236.36.182.44 dst=45.153.183.27 protocol=udp sport=40498 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 40498,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "236.36.182.44",
"serverIP": "45.153.183.27"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=236.36.182.44 dst=45.153.183.27 protocol=udp sport=40498 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=236.36.182.44 dst=45.153.183.27 protocol=udp sport=40498 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 40498
protocol: 17
streamName: meraki_l7_firewall
clientIP: 236.36.182.44
serverIP: 45.153.183.27 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=121.105.100.185 dst=179.197.217.205 protocol=udp sport=40498 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=121.105.100.185 dst=179.197.217.205 protocol=udp sport=40498 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 40498,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "121.105.100.185",
"serverIP": "179.197.217.205"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=121.105.100.185 dst=179.197.217.205 protocol=udp sport=40498 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=121.105.100.185 dst=179.197.217.205 protocol=udp sport=40498 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 40498
protocol: 17
streamName: meraki_l7_firewall
clientIP: 121.105.100.185
serverIP: 179.197.217.205 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=42.19.214.199 dst=198.127.153.225 protocol=udp sport=40498 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=42.19.214.199 dst=198.127.153.225 protocol=udp sport=40498 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 40498,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "42.19.214.199",
"serverIP": "198.127.153.225"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=42.19.214.199 dst=198.127.153.225 protocol=udp sport=40498 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=42.19.214.199 dst=198.127.153.225 protocol=udp sport=40498 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 40498
protocol: 17
streamName: meraki_l7_firewall
clientIP: 42.19.214.199
serverIP: 198.127.153.225 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=131.189.43.147 dst=168.80.217.102 protocol=udp sport=40498 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=131.189.43.147 dst=168.80.217.102 protocol=udp sport=40498 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 40498,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "131.189.43.147",
"serverIP": "168.80.217.102"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=131.189.43.147 dst=168.80.217.102 protocol=udp sport=40498 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1665316895.567693785 NORDC_MX400_1 l7_firewall src=131.189.43.147 dst=168.80.217.102 protocol=udp sport=40498 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 40498
protocol: 17
streamName: meraki_l7_firewall
clientIP: 131.189.43.147
serverIP: 168.80.217.102 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657358902.482061921 NORDC_MX400_1 l7_firewall src=254.124.203.72 dst=107.21.249.107 protocol=tcp sport=22 dport=41952 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657358902.482061921 NORDC_MX400_1 l7_firewall src=254.124.203.72 dst=107.21.249.107 protocol=tcp sport=22 dport=41952 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 41952,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "107.21.249.107",
"serverIP": "254.124.203.72"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657358902.482061921 NORDC_MX400_1 l7_firewall src=254.124.203.72 dst=107.21.249.107 protocol=tcp sport=22 dport=41952 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657358902.482061921 NORDC_MX400_1 l7_firewall src=254.124.203.72 dst=107.21.249.107 protocol=tcp sport=22 dport=41952 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 22
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 41952
protocol: 6
streamName: meraki_l7_firewall
clientIP: 107.21.249.107
serverIP: 254.124.203.72 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657358902.482061921 NORDC_MX400_1 l7_firewall src=18.104.163.189 dst=147.156.240.186 protocol=tcp sport=22 dport=41952 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657358902.482061921 NORDC_MX400_1 l7_firewall src=18.104.163.189 dst=147.156.240.186 protocol=tcp sport=22 dport=41952 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 41952,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "147.156.240.186",
"serverIP": "18.104.163.189"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657358902.482061921 NORDC_MX400_1 l7_firewall src=18.104.163.189 dst=147.156.240.186 protocol=tcp sport=22 dport=41952 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.