input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=201.241.144.142 dst=98.11.220.105 protocol=tcp sport=64218 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=201.241.144.142 dst=98.11.220.105 protocol=tcp sport=64218 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 64218
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 201.241.144.142
serverIP: 98.11.220.105 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=28.89.194.90 dst=114.6.0.160 protocol=tcp sport=64218 dport=443 decision=blocked | {
"action": "block",
"clientport": 64218,
"message": "<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=28.89.194.90 dst=114.6.0.160 protocol=tcp sport=64218 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "28.89.194.90",
"serverIP": "114.6.0.160"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=28.89.194.90 dst=114.6.0.160 protocol=tcp sport=64218 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=28.89.194.90 dst=114.6.0.160 protocol=tcp sport=64218 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 64218
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 28.89.194.90
serverIP: 114.6.0.160 | Explain this syslog message |
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=179.173.13.233 dst=147.46.137.143 protocol=tcp sport=59733 dport=443 decision=blocked | {
"action": "block",
"clientport": 59733,
"message": "<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=179.173.13.233 dst=147.46.137.143 protocol=tcp sport=59733 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "179.173.13.233",
"serverIP": "147.46.137.143"
} | Create a JSON artifact from the message |
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=179.173.13.233 dst=147.46.137.143 protocol=tcp sport=59733 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=179.173.13.233 dst=147.46.137.143 protocol=tcp sport=59733 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59733
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 179.173.13.233
serverIP: 147.46.137.143 | Explain this syslog message |
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=103.181.136.218 dst=98.176.149.11 protocol=tcp sport=59733 dport=443 decision=blocked | {
"action": "block",
"clientport": 59733,
"message": "<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=103.181.136.218 dst=98.176.149.11 protocol=tcp sport=59733 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "103.181.136.218",
"serverIP": "98.176.149.11"
} | Create a JSON artifact from the message |
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=103.181.136.218 dst=98.176.149.11 protocol=tcp sport=59733 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=103.181.136.218 dst=98.176.149.11 protocol=tcp sport=59733 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59733
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 103.181.136.218
serverIP: 98.176.149.11 | Explain this syslog message |
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=222.128.229.241 dst=224.131.119.189 protocol=tcp sport=59733 dport=443 decision=blocked | {
"action": "block",
"clientport": 59733,
"message": "<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=222.128.229.241 dst=224.131.119.189 protocol=tcp sport=59733 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "222.128.229.241",
"serverIP": "224.131.119.189"
} | Create a JSON artifact from the message |
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=222.128.229.241 dst=224.131.119.189 protocol=tcp sport=59733 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=222.128.229.241 dst=224.131.119.189 protocol=tcp sport=59733 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59733
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 222.128.229.241
serverIP: 224.131.119.189 | Explain this syslog message |
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=10.44.2.110 dst=169.9.139.31 protocol=tcp sport=59733 dport=443 decision=blocked | {
"action": "block",
"clientport": 59733,
"message": "<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=10.44.2.110 dst=169.9.139.31 protocol=tcp sport=59733 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "10.44.2.110",
"serverIP": "169.9.139.31"
} | Create a JSON artifact from the message |
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=10.44.2.110 dst=169.9.139.31 protocol=tcp sport=59733 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=10.44.2.110 dst=169.9.139.31 protocol=tcp sport=59733 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59733
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 10.44.2.110
serverIP: 169.9.139.31 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=60.182.88.230 dst=1.10.184.251 protocol=tcp sport=80 dport=43283 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=60.182.88.230 dst=1.10.184.251 protocol=tcp sport=80 dport=43283 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 43283,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "1.10.184.251",
"serverIP": "60.182.88.230"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=60.182.88.230 dst=1.10.184.251 protocol=tcp sport=80 dport=43283 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=60.182.88.230 dst=1.10.184.251 protocol=tcp sport=80 dport=43283 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 43283
protocol: 6
streamName: meraki_l7_firewall
clientIP: 1.10.184.251
serverIP: 60.182.88.230 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=196.26.13.255 dst=117.253.168.195 protocol=tcp sport=80 dport=43283 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=196.26.13.255 dst=117.253.168.195 protocol=tcp sport=80 dport=43283 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 43283,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "117.253.168.195",
"serverIP": "196.26.13.255"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=196.26.13.255 dst=117.253.168.195 protocol=tcp sport=80 dport=43283 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=196.26.13.255 dst=117.253.168.195 protocol=tcp sport=80 dport=43283 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 43283
protocol: 6
streamName: meraki_l7_firewall
clientIP: 117.253.168.195
serverIP: 196.26.13.255 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=125.64.91.6 dst=238.62.140.175 protocol=tcp sport=80 dport=43283 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=125.64.91.6 dst=238.62.140.175 protocol=tcp sport=80 dport=43283 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 43283,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "238.62.140.175",
"serverIP": "125.64.91.6"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=125.64.91.6 dst=238.62.140.175 protocol=tcp sport=80 dport=43283 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=125.64.91.6 dst=238.62.140.175 protocol=tcp sport=80 dport=43283 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 43283
protocol: 6
streamName: meraki_l7_firewall
clientIP: 238.62.140.175
serverIP: 125.64.91.6 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=32.171.175.171 dst=248.108.57.124 protocol=tcp sport=80 dport=43283 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=32.171.175.171 dst=248.108.57.124 protocol=tcp sport=80 dport=43283 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 43283,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "248.108.57.124",
"serverIP": "32.171.175.171"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=32.171.175.171 dst=248.108.57.124 protocol=tcp sport=80 dport=43283 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=32.171.175.171 dst=248.108.57.124 protocol=tcp sport=80 dport=43283 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 43283
protocol: 6
streamName: meraki_l7_firewall
clientIP: 248.108.57.124
serverIP: 32.171.175.171 | Explain this syslog message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=51.93.46.93 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=114.14.140.159 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=114.14.140.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:162.142.125.210",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=51.93.46.93 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=114.14.140.159 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=114.14.140.159 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1658390346707 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MALFORMED_VERSION",
"severitycode": 9,
"fqdn": "/*",
"clientport": 34606,
"vendorcode": "119",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "114.14.140.159",
"serverIP": "51.93.46.93",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=51.93.46.93 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=114.14.140.159 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=114.14.140.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=51.93.46.93 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=114.14.140.159 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=114.14.140.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:162.142.125.210', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION']
productids: [0]
sourceinfo: unknown
localstarttime: 1658390346707
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MALFORMED_VERSION
severitycode: 9
fqdn: /*
clientport: 34606
vendorcode: 119
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 114.14.140.159
serverIP: 51.93.46.93
userName: - | Explain this syslog message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=54.216.91.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=100.99.78.79 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=100.99.78.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:162.142.125.210",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=54.216.91.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=100.99.78.79 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=100.99.78.79 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1658390346707 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MALFORMED_VERSION",
"severitycode": 9,
"fqdn": "/*",
"clientport": 34606,
"vendorcode": "119",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "100.99.78.79",
"serverIP": "54.216.91.128",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=54.216.91.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=100.99.78.79 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=100.99.78.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=54.216.91.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=100.99.78.79 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=100.99.78.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:162.142.125.210', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION']
productids: [0]
sourceinfo: unknown
localstarttime: 1658390346707
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MALFORMED_VERSION
severitycode: 9
fqdn: /*
clientport: 34606
vendorcode: 119
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 100.99.78.79
serverIP: 54.216.91.128
userName: - | Explain this syslog message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=168.197.246.116 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=196.2.98.7 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=196.2.98.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:162.142.125.210",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=168.197.246.116 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=196.2.98.7 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=196.2.98.7 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1658390346707 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MALFORMED_VERSION",
"severitycode": 9,
"fqdn": "/*",
"clientport": 34606,
"vendorcode": "119",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "196.2.98.7",
"serverIP": "168.197.246.116",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=168.197.246.116 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=196.2.98.7 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=196.2.98.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=168.197.246.116 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=196.2.98.7 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=196.2.98.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:162.142.125.210', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION']
productids: [0]
sourceinfo: unknown
localstarttime: 1658390346707
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MALFORMED_VERSION
severitycode: 9
fqdn: /*
clientport: 34606
vendorcode: 119
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 196.2.98.7
serverIP: 168.197.246.116
userName: - | Explain this syslog message |
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=27.219.249.219 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=34.32.203.66 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=34.32.203.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"ProxyIP:162.142.125.8"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=27.219.249.219 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=34.32.203.66 spt=38700 requestMethod=PRI app=HTTP requestContext=\"-\" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=34.32.203.66 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1658390407328 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MALFORMED_VERSION",
"severitycode": 9,
"fqdn": "/*",
"clientport": 38700,
"vendorcode": "119",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "34.32.203.66",
"serverIP": "27.219.249.219",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=27.219.249.219 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=34.32.203.66 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=34.32.203.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=27.219.249.219 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=34.32.203.66 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=34.32.203.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'ProxyIP:162.142.125.8']
productids: [0]
sourceinfo: unknown
localstarttime: 1658390407328
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MALFORMED_VERSION
severitycode: 9
fqdn: /*
clientport: 38700
vendorcode: 119
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 34.32.203.66
serverIP: 27.219.249.219
userName: - | Explain this syslog message |
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=215.137.111.237 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=101.161.63.110 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=101.161.63.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"ProxyIP:162.142.125.8"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=215.137.111.237 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=101.161.63.110 spt=38700 requestMethod=PRI app=HTTP requestContext=\"-\" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=101.161.63.110 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1658390407328 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MALFORMED_VERSION",
"severitycode": 9,
"fqdn": "/*",
"clientport": 38700,
"vendorcode": "119",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "101.161.63.110",
"serverIP": "215.137.111.237",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=215.137.111.237 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=101.161.63.110 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=101.161.63.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=215.137.111.237 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=101.161.63.110 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=101.161.63.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'ProxyIP:162.142.125.8']
productids: [0]
sourceinfo: unknown
localstarttime: 1658390407328
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MALFORMED_VERSION
severitycode: 9
fqdn: /*
clientport: 38700
vendorcode: 119
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 101.161.63.110
serverIP: 215.137.111.237
userName: - | Explain this syslog message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=173.168.48.86 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=137.106.79.184 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.106.79.184 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:162.142.125.210",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=173.168.48.86 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=137.106.79.184 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.106.79.184 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1658390346707 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MALFORMED_VERSION",
"severitycode": 9,
"fqdn": "/*",
"clientport": 34606,
"vendorcode": "119",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "137.106.79.184",
"serverIP": "173.168.48.86",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=173.168.48.86 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=137.106.79.184 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.106.79.184 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=173.168.48.86 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=137.106.79.184 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.106.79.184 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:162.142.125.210', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION']
productids: [0]
sourceinfo: unknown
localstarttime: 1658390346707
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MALFORMED_VERSION
severitycode: 9
fqdn: /*
clientport: 34606
vendorcode: 119
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 137.106.79.184
serverIP: 173.168.48.86
userName: - | Explain this syslog message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=59.247.127.36 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=41.88.5.211 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=41.88.5.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:162.142.125.210",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=59.247.127.36 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=41.88.5.211 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=41.88.5.211 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1658390346707 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MALFORMED_VERSION",
"severitycode": 9,
"fqdn": "/*",
"clientport": 34606,
"vendorcode": "119",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "41.88.5.211",
"serverIP": "59.247.127.36",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=59.247.127.36 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=41.88.5.211 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=41.88.5.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=59.247.127.36 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=41.88.5.211 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=41.88.5.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:162.142.125.210', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION']
productids: [0]
sourceinfo: unknown
localstarttime: 1658390346707
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MALFORMED_VERSION
severitycode: 9
fqdn: /*
clientport: 34606
vendorcode: 119
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 41.88.5.211
serverIP: 59.247.127.36
userName: - | Explain this syslog message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=97.81.4.181 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=76.57.190.254 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=76.57.190.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"ProxyIP:162.142.125.210",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=97.81.4.181 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=76.57.190.254 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=76.57.190.254 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1658390346707 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MALFORMED_VERSION",
"severitycode": 9,
"fqdn": "/*",
"clientport": 34606,
"vendorcode": "119",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "76.57.190.254",
"serverIP": "97.81.4.181",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=97.81.4.181 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=76.57.190.254 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=76.57.190.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=97.81.4.181 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=76.57.190.254 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=76.57.190.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'ProxyIP:162.142.125.210', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION']
productids: [0]
sourceinfo: unknown
localstarttime: 1658390346707
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MALFORMED_VERSION
severitycode: 9
fqdn: /*
clientport: 34606
vendorcode: 119
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 76.57.190.254
serverIP: 97.81.4.181
userName: - | Explain this syslog message |
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=203.186.154.85 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=14.200.45.250 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=14.200.45.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"ProxyIP:162.142.125.8"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=203.186.154.85 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=14.200.45.250 spt=38700 requestMethod=PRI app=HTTP requestContext=\"-\" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=14.200.45.250 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1658390407328 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MALFORMED_VERSION",
"severitycode": 9,
"fqdn": "/*",
"clientport": 38700,
"vendorcode": "119",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "14.200.45.250",
"serverIP": "203.186.154.85",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=203.186.154.85 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=14.200.45.250 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=14.200.45.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=203.186.154.85 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=14.200.45.250 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=14.200.45.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'ProxyIP:162.142.125.8']
productids: [0]
sourceinfo: unknown
localstarttime: 1658390407328
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MALFORMED_VERSION
severitycode: 9
fqdn: /*
clientport: 38700
vendorcode: 119
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 14.200.45.250
serverIP: 203.186.154.85
userName: - | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=239.75.130.113 dst=76.188.56.170 protocol=udp sport=42514 dport=53 decision=blocked | {
"action": "block",
"clientport": 42514,
"message": "<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=239.75.130.113 dst=76.188.56.170 protocol=udp sport=42514 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "239.75.130.113",
"serverIP": "76.188.56.170"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=239.75.130.113 dst=76.188.56.170 protocol=udp sport=42514 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=239.75.130.113 dst=76.188.56.170 protocol=udp sport=42514 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 42514
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 239.75.130.113
serverIP: 76.188.56.170 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=90.153.229.221 dst=99.147.7.253 protocol=udp sport=42514 dport=53 decision=blocked | {
"action": "block",
"clientport": 42514,
"message": "<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=90.153.229.221 dst=99.147.7.253 protocol=udp sport=42514 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "90.153.229.221",
"serverIP": "99.147.7.253"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=90.153.229.221 dst=99.147.7.253 protocol=udp sport=42514 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=90.153.229.221 dst=99.147.7.253 protocol=udp sport=42514 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 42514
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 90.153.229.221
serverIP: 99.147.7.253 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=74.246.82.80 dst=212.189.248.245 protocol=udp sport=42514 dport=53 decision=blocked | {
"action": "block",
"clientport": 42514,
"message": "<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=74.246.82.80 dst=212.189.248.245 protocol=udp sport=42514 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "74.246.82.80",
"serverIP": "212.189.248.245"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=74.246.82.80 dst=212.189.248.245 protocol=udp sport=42514 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=74.246.82.80 dst=212.189.248.245 protocol=udp sport=42514 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 42514
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 74.246.82.80
serverIP: 212.189.248.245 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=28.37.199.175 dst=86.247.140.195 protocol=udp sport=42514 dport=53 decision=blocked | {
"action": "block",
"clientport": 42514,
"message": "<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=28.37.199.175 dst=86.247.140.195 protocol=udp sport=42514 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "28.37.199.175",
"serverIP": "86.247.140.195"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=28.37.199.175 dst=86.247.140.195 protocol=udp sport=42514 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=28.37.199.175 dst=86.247.140.195 protocol=udp sport=42514 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 42514
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 28.37.199.175
serverIP: 86.247.140.195 | Explain this syslog message |
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=154.149.74.104 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=120.86.21.99 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.86.21.99 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53048,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1691514915772 ",
"message": "<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=154.149.74.104 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=120.86.21.99 spt=53048 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.86.21.99 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:209.97.143.186",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "120.86.21.99",
"serverIP": "154.149.74.104",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=154.149.74.104 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=120.86.21.99 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.86.21.99 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=154.149.74.104 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=120.86.21.99 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.86.21.99 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53048
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1691514915772
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:209.97.143.186', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 120.86.21.99
serverIP: 154.149.74.104
userName: - | Explain this syslog message |
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=241.113.148.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.241.57.151 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.241.57.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53048,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1691514915772 ",
"message": "<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=241.113.148.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=151.241.57.151 spt=53048 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.241.57.151 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:209.97.143.186",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "151.241.57.151",
"serverIP": "241.113.148.73",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=241.113.148.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.241.57.151 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.241.57.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=241.113.148.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.241.57.151 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.241.57.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53048
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1691514915772
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:209.97.143.186', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 151.241.57.151
serverIP: 241.113.148.73
userName: - | Explain this syslog message |
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.102.19.22 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.115.166.254 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.115.166.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53048,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1691514915772 ",
"message": "<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.102.19.22 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=252.115.166.254 spt=53048 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.115.166.254 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:209.97.143.186",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "252.115.166.254",
"serverIP": "239.102.19.22",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.102.19.22 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.115.166.254 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.115.166.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.102.19.22 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.115.166.254 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.115.166.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53048
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1691514915772
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:209.97.143.186', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 252.115.166.254
serverIP: 239.102.19.22
userName: - | Explain this syslog message |
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.66.113.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.135.221.227 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.135.221.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53070,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1691514917742 ",
"message": "<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.66.113.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=79.135.221.227 spt=53070 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication=\"StatusCake_Pagespeed_indev\" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.135.221.227 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:209.97.143.186",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "79.135.221.227",
"serverIP": "45.66.113.97",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.66.113.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.135.221.227 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.135.221.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.66.113.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.135.221.227 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.135.221.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53070
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1691514917742
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:209.97.143.186', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 79.135.221.227
serverIP: 45.66.113.97
userName: - | Explain this syslog message |
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=21.5.213.106 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.85.84.147 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.85.84.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53070,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1691514917742 ",
"message": "<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=21.5.213.106 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=184.85.84.147 spt=53070 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication=\"StatusCake_Pagespeed_indev\" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.85.84.147 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:209.97.143.186",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "184.85.84.147",
"serverIP": "21.5.213.106",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=21.5.213.106 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.85.84.147 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.85.84.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=21.5.213.106 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.85.84.147 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.85.84.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53070
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1691514917742
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:209.97.143.186', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 184.85.84.147
serverIP: 21.5.213.106
userName: - | Explain this syslog message |
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=146.219.98.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=234.68.212.242 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.68.212.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53070,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1691514917742 ",
"message": "<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=146.219.98.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=234.68.212.242 spt=53070 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication=\"StatusCake_Pagespeed_indev\" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.68.212.242 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"ProxyIP:209.97.143.186",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "234.68.212.242",
"serverIP": "146.219.98.175",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=146.219.98.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=234.68.212.242 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.68.212.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=146.219.98.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=234.68.212.242 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.68.212.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53070
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1691514917742
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:209.97.143.186', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 234.68.212.242
serverIP: 146.219.98.175
userName: - | Explain this syslog message |
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=230.125.208.88 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=245.209.44.166 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=245.209.44.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.158.113.63",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=230.125.208.88 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=245.209.44.166 spt=54864 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0\" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=245.209.44.166 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1663241712007 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/logo.php",
"clientport": 54864,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "245.209.44.166",
"serverIP": "230.125.208.88",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=230.125.208.88 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=245.209.44.166 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=245.209.44.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=230.125.208.88 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=245.209.44.166 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=245.209.44.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.158.113.63', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1663241712007
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /logo.php
clientport: 54864
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 245.209.44.166
serverIP: 230.125.208.88
userName: - | Explain this syslog message |
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=137.77.215.138 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=49.106.129.92 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.106.129.92 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.158.113.63",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=137.77.215.138 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=49.106.129.92 spt=54864 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0\" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.106.129.92 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1663241712007 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/logo.php",
"clientport": 54864,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "49.106.129.92",
"serverIP": "137.77.215.138",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=137.77.215.138 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=49.106.129.92 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.106.129.92 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=137.77.215.138 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=49.106.129.92 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.106.129.92 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.158.113.63', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1663241712007
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /logo.php
clientport: 54864
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 49.106.129.92
serverIP: 137.77.215.138
userName: - | Explain this syslog message |
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=60.214.11.141 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.130.170.190 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.130.170.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.158.113.63",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=60.214.11.141 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=139.130.170.190 spt=54864 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0\" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.130.170.190 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1663241712007 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/logo.php",
"clientport": 54864,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "139.130.170.190",
"serverIP": "60.214.11.141",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=60.214.11.141 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.130.170.190 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.130.170.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=60.214.11.141 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.130.170.190 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.130.170.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.158.113.63', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1663241712007
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /logo.php
clientport: 54864
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 139.130.170.190
serverIP: 60.214.11.141
userName: - | Explain this syslog message |
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699155297|access denied|188.114.100.169|https://shareholders.stark.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "ip-10-1-16-76",
"localstarttime": "Nov 5 03:34:57",
"message": "<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699155297|access denied|188.114.100.169|https://shareholders.stark.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1699155297",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "188.114.100.169"
} | Create a JSON artifact from the message |
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699155297|access denied|188.114.100.169|https://shareholders.stark.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699155297|access denied|188.114.100.169|https://shareholders.stark.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: ip-10-1-16-76
localstarttime: Nov 5 03:34:57
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1699155297
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 188.114.100.169 | Explain this syslog message |
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699155297|access denied|185.223.90.145|https://shareholders.wayne.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "ip-10-1-16-76",
"localstarttime": "Nov 5 03:34:57",
"message": "<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699155297|access denied|185.223.90.145|https://shareholders.wayne.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1699155297",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "185.223.90.145"
} | Create a JSON artifact from the message |
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699155297|access denied|185.223.90.145|https://shareholders.wayne.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.