input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=201.241.144.142 dst=98.11.220.105 protocol=tcp sport=64218 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=201.241.144.142 dst=98.11.220.105 protocol=tcp sport=64218 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 64218 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 201.241.144.142 serverIP: 98.11.220.105
Explain this syslog message
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=28.89.194.90 dst=114.6.0.160 protocol=tcp sport=64218 dport=443 decision=blocked
{ "action": "block", "clientport": 64218, "message": "<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=28.89.194.90 dst=114.6.0.160 protocol=tcp sport=64218 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "28.89.194.90", "serverIP": "114.6.0.160" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=28.89.194.90 dst=114.6.0.160 protocol=tcp sport=64218 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=28.89.194.90 dst=114.6.0.160 protocol=tcp sport=64218 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 64218 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 28.89.194.90 serverIP: 114.6.0.160
Explain this syslog message
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=179.173.13.233 dst=147.46.137.143 protocol=tcp sport=59733 dport=443 decision=blocked
{ "action": "block", "clientport": 59733, "message": "<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=179.173.13.233 dst=147.46.137.143 protocol=tcp sport=59733 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "179.173.13.233", "serverIP": "147.46.137.143" }
Create a JSON artifact from the message
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=179.173.13.233 dst=147.46.137.143 protocol=tcp sport=59733 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=179.173.13.233 dst=147.46.137.143 protocol=tcp sport=59733 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59733 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 179.173.13.233 serverIP: 147.46.137.143
Explain this syslog message
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=103.181.136.218 dst=98.176.149.11 protocol=tcp sport=59733 dport=443 decision=blocked
{ "action": "block", "clientport": 59733, "message": "<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=103.181.136.218 dst=98.176.149.11 protocol=tcp sport=59733 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "103.181.136.218", "serverIP": "98.176.149.11" }
Create a JSON artifact from the message
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=103.181.136.218 dst=98.176.149.11 protocol=tcp sport=59733 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=103.181.136.218 dst=98.176.149.11 protocol=tcp sport=59733 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59733 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 103.181.136.218 serverIP: 98.176.149.11
Explain this syslog message
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=222.128.229.241 dst=224.131.119.189 protocol=tcp sport=59733 dport=443 decision=blocked
{ "action": "block", "clientport": 59733, "message": "<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=222.128.229.241 dst=224.131.119.189 protocol=tcp sport=59733 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "222.128.229.241", "serverIP": "224.131.119.189" }
Create a JSON artifact from the message
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=222.128.229.241 dst=224.131.119.189 protocol=tcp sport=59733 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=222.128.229.241 dst=224.131.119.189 protocol=tcp sport=59733 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59733 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 222.128.229.241 serverIP: 224.131.119.189
Explain this syslog message
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=10.44.2.110 dst=169.9.139.31 protocol=tcp sport=59733 dport=443 decision=blocked
{ "action": "block", "clientport": 59733, "message": "<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=10.44.2.110 dst=169.9.139.31 protocol=tcp sport=59733 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "10.44.2.110", "serverIP": "169.9.139.31" }
Create a JSON artifact from the message
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=10.44.2.110 dst=169.9.139.31 protocol=tcp sport=59733 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.54.110.146 1 1691200217.993684482 M68_MX67C_Statesboro l7_firewall src=10.44.2.110 dst=169.9.139.31 protocol=tcp sport=59733 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 59733 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 10.44.2.110 serverIP: 169.9.139.31
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=60.182.88.230 dst=1.10.184.251 protocol=tcp sport=80 dport=43283 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=60.182.88.230 dst=1.10.184.251 protocol=tcp sport=80 dport=43283 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 43283, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "1.10.184.251", "serverIP": "60.182.88.230" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=60.182.88.230 dst=1.10.184.251 protocol=tcp sport=80 dport=43283 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=60.182.88.230 dst=1.10.184.251 protocol=tcp sport=80 dport=43283 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 43283 protocol: 6 streamName: meraki_l7_firewall clientIP: 1.10.184.251 serverIP: 60.182.88.230
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=196.26.13.255 dst=117.253.168.195 protocol=tcp sport=80 dport=43283 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=196.26.13.255 dst=117.253.168.195 protocol=tcp sport=80 dport=43283 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 43283, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "117.253.168.195", "serverIP": "196.26.13.255" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=196.26.13.255 dst=117.253.168.195 protocol=tcp sport=80 dport=43283 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=196.26.13.255 dst=117.253.168.195 protocol=tcp sport=80 dport=43283 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 43283 protocol: 6 streamName: meraki_l7_firewall clientIP: 117.253.168.195 serverIP: 196.26.13.255
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=125.64.91.6 dst=238.62.140.175 protocol=tcp sport=80 dport=43283 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=125.64.91.6 dst=238.62.140.175 protocol=tcp sport=80 dport=43283 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 43283, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "238.62.140.175", "serverIP": "125.64.91.6" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=125.64.91.6 dst=238.62.140.175 protocol=tcp sport=80 dport=43283 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=125.64.91.6 dst=238.62.140.175 protocol=tcp sport=80 dport=43283 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 43283 protocol: 6 streamName: meraki_l7_firewall clientIP: 238.62.140.175 serverIP: 125.64.91.6
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=32.171.175.171 dst=248.108.57.124 protocol=tcp sport=80 dport=43283 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=32.171.175.171 dst=248.108.57.124 protocol=tcp sport=80 dport=43283 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 43283, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "248.108.57.124", "serverIP": "32.171.175.171" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=32.171.175.171 dst=248.108.57.124 protocol=tcp sport=80 dport=43283 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661905268.733462928 NORDC_MX400_1 l7_firewall src=32.171.175.171 dst=248.108.57.124 protocol=tcp sport=80 dport=43283 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 43283 protocol: 6 streamName: meraki_l7_firewall clientIP: 248.108.57.124 serverIP: 32.171.175.171
Explain this syslog message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=51.93.46.93 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=114.14.140.159 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=114.14.140.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:162.142.125.210", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=51.93.46.93 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=114.14.140.159 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=114.14.140.159 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1658390346707 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MALFORMED_VERSION", "severitycode": 9, "fqdn": "/*", "clientport": 34606, "vendorcode": "119", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "114.14.140.159", "serverIP": "51.93.46.93", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=51.93.46.93 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=114.14.140.159 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=114.14.140.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=51.93.46.93 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=114.14.140.159 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=114.14.140.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:162.142.125.210', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION'] productids: [0] sourceinfo: unknown localstarttime: 1658390346707 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MALFORMED_VERSION severitycode: 9 fqdn: /* clientport: 34606 vendorcode: 119 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 114.14.140.159 serverIP: 51.93.46.93 userName: -
Explain this syslog message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=54.216.91.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=100.99.78.79 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=100.99.78.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:162.142.125.210", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=54.216.91.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=100.99.78.79 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=100.99.78.79 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1658390346707 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MALFORMED_VERSION", "severitycode": 9, "fqdn": "/*", "clientport": 34606, "vendorcode": "119", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "100.99.78.79", "serverIP": "54.216.91.128", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=54.216.91.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=100.99.78.79 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=100.99.78.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=54.216.91.128 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=100.99.78.79 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=100.99.78.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:162.142.125.210', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION'] productids: [0] sourceinfo: unknown localstarttime: 1658390346707 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MALFORMED_VERSION severitycode: 9 fqdn: /* clientport: 34606 vendorcode: 119 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 100.99.78.79 serverIP: 54.216.91.128 userName: -
Explain this syslog message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=168.197.246.116 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=196.2.98.7 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=196.2.98.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:162.142.125.210", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=168.197.246.116 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=196.2.98.7 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=196.2.98.7 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1658390346707 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MALFORMED_VERSION", "severitycode": 9, "fqdn": "/*", "clientport": 34606, "vendorcode": "119", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "196.2.98.7", "serverIP": "168.197.246.116", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=168.197.246.116 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=196.2.98.7 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=196.2.98.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=168.197.246.116 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=196.2.98.7 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=196.2.98.7 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:162.142.125.210', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION'] productids: [0] sourceinfo: unknown localstarttime: 1658390346707 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MALFORMED_VERSION severitycode: 9 fqdn: /* clientport: 34606 vendorcode: 119 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 196.2.98.7 serverIP: 168.197.246.116 userName: -
Explain this syslog message
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=27.219.249.219 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=34.32.203.66 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=34.32.203.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "ProxyIP:162.142.125.8" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=27.219.249.219 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=34.32.203.66 spt=38700 requestMethod=PRI app=HTTP requestContext=\"-\" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=34.32.203.66 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1658390407328 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MALFORMED_VERSION", "severitycode": 9, "fqdn": "/*", "clientport": 38700, "vendorcode": "119", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "34.32.203.66", "serverIP": "27.219.249.219", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=27.219.249.219 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=34.32.203.66 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=34.32.203.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=27.219.249.219 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=34.32.203.66 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=34.32.203.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'ProxyIP:162.142.125.8'] productids: [0] sourceinfo: unknown localstarttime: 1658390407328 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MALFORMED_VERSION severitycode: 9 fqdn: /* clientport: 38700 vendorcode: 119 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 34.32.203.66 serverIP: 27.219.249.219 userName: -
Explain this syslog message
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=215.137.111.237 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=101.161.63.110 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=101.161.63.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "ProxyIP:162.142.125.8" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=215.137.111.237 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=101.161.63.110 spt=38700 requestMethod=PRI app=HTTP requestContext=\"-\" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=101.161.63.110 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1658390407328 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MALFORMED_VERSION", "severitycode": 9, "fqdn": "/*", "clientport": 38700, "vendorcode": "119", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "101.161.63.110", "serverIP": "215.137.111.237", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=215.137.111.237 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=101.161.63.110 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=101.161.63.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=215.137.111.237 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=101.161.63.110 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=101.161.63.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'ProxyIP:162.142.125.8'] productids: [0] sourceinfo: unknown localstarttime: 1658390407328 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MALFORMED_VERSION severitycode: 9 fqdn: /* clientport: 38700 vendorcode: 119 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 101.161.63.110 serverIP: 215.137.111.237 userName: -
Explain this syslog message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=173.168.48.86 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=137.106.79.184 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.106.79.184 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:162.142.125.210", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=173.168.48.86 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=137.106.79.184 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.106.79.184 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1658390346707 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MALFORMED_VERSION", "severitycode": 9, "fqdn": "/*", "clientport": 34606, "vendorcode": "119", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "137.106.79.184", "serverIP": "173.168.48.86", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=173.168.48.86 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=137.106.79.184 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.106.79.184 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=173.168.48.86 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=137.106.79.184 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=137.106.79.184 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:162.142.125.210', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION'] productids: [0] sourceinfo: unknown localstarttime: 1658390346707 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MALFORMED_VERSION severitycode: 9 fqdn: /* clientport: 34606 vendorcode: 119 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 137.106.79.184 serverIP: 173.168.48.86 userName: -
Explain this syslog message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=59.247.127.36 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=41.88.5.211 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=41.88.5.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:162.142.125.210", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=59.247.127.36 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=41.88.5.211 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=41.88.5.211 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1658390346707 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MALFORMED_VERSION", "severitycode": 9, "fqdn": "/*", "clientport": 34606, "vendorcode": "119", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "41.88.5.211", "serverIP": "59.247.127.36", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=59.247.127.36 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=41.88.5.211 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=41.88.5.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=59.247.127.36 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=41.88.5.211 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=41.88.5.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:162.142.125.210', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION'] productids: [0] sourceinfo: unknown localstarttime: 1658390346707 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MALFORMED_VERSION severitycode: 9 fqdn: /* clientport: 34606 vendorcode: 119 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 41.88.5.211 serverIP: 59.247.127.36 userName: -
Explain this syslog message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=97.81.4.181 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=76.57.190.254 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=76.57.190.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "ProxyIP:162.142.125.210", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=97.81.4.181 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=76.57.190.254 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=76.57.190.254 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1658390346707 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MALFORMED_VERSION", "severitycode": 9, "fqdn": "/*", "clientport": 34606, "vendorcode": "119", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "76.57.190.254", "serverIP": "97.81.4.181", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=97.81.4.181 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=76.57.190.254 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=76.57.190.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 21 02:59:06 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=97.81.4.181 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=76.57.190.254 spt=34606 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Jul 21 2022 02:59:06 rt=1658390346707 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc47bd3-3cb75718 cn2=34606 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=76.57.190.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'ProxyIP:162.142.125.210', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION'] productids: [0] sourceinfo: unknown localstarttime: 1658390346707 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MALFORMED_VERSION severitycode: 9 fqdn: /* clientport: 34606 vendorcode: 119 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 76.57.190.254 serverIP: 97.81.4.181 userName: -
Explain this syslog message
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=203.186.154.85 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=14.200.45.250 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=14.200.45.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "ProxyIP:162.142.125.8" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=203.186.154.85 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=14.200.45.250 spt=38700 requestMethod=PRI app=HTTP requestContext=\"-\" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=14.200.45.250 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1658390407328 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MALFORMED_VERSION", "severitycode": 9, "fqdn": "/*", "clientport": 38700, "vendorcode": "119", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "14.200.45.250", "serverIP": "203.186.154.85", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=203.186.154.85 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=14.200.45.250 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=14.200.45.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 21 03:00:07 WAFirewall CEF:0|Barracuda|WAF|1101|119|MALFORMED_VERSION|1|cat=WF dst=203.186.154.85 dpt=80 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=14.200.45.250 spt=38700 requestMethod=PRI app=HTTP requestContext="-" start=Jul 21 2022 03:00:07 rt=1658390407328 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=1821fc568a0-45b8b9ba cn2=38700 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=14.200.45.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'ProxyIP:162.142.125.8'] productids: [0] sourceinfo: unknown localstarttime: 1658390407328 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MALFORMED_VERSION severitycode: 9 fqdn: /* clientport: 38700 vendorcode: 119 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 14.200.45.250 serverIP: 203.186.154.85 userName: -
Explain this syslog message
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=239.75.130.113 dst=76.188.56.170 protocol=udp sport=42514 dport=53 decision=blocked
{ "action": "block", "clientport": 42514, "message": "<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=239.75.130.113 dst=76.188.56.170 protocol=udp sport=42514 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "239.75.130.113", "serverIP": "76.188.56.170" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=239.75.130.113 dst=76.188.56.170 protocol=udp sport=42514 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=239.75.130.113 dst=76.188.56.170 protocol=udp sport=42514 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 42514 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 239.75.130.113 serverIP: 76.188.56.170
Explain this syslog message
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=90.153.229.221 dst=99.147.7.253 protocol=udp sport=42514 dport=53 decision=blocked
{ "action": "block", "clientport": 42514, "message": "<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=90.153.229.221 dst=99.147.7.253 protocol=udp sport=42514 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "90.153.229.221", "serverIP": "99.147.7.253" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=90.153.229.221 dst=99.147.7.253 protocol=udp sport=42514 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=90.153.229.221 dst=99.147.7.253 protocol=udp sport=42514 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 42514 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 90.153.229.221 serverIP: 99.147.7.253
Explain this syslog message
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=74.246.82.80 dst=212.189.248.245 protocol=udp sport=42514 dport=53 decision=blocked
{ "action": "block", "clientport": 42514, "message": "<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=74.246.82.80 dst=212.189.248.245 protocol=udp sport=42514 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "74.246.82.80", "serverIP": "212.189.248.245" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=74.246.82.80 dst=212.189.248.245 protocol=udp sport=42514 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=74.246.82.80 dst=212.189.248.245 protocol=udp sport=42514 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 42514 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 74.246.82.80 serverIP: 212.189.248.245
Explain this syslog message
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=28.37.199.175 dst=86.247.140.195 protocol=udp sport=42514 dport=53 decision=blocked
{ "action": "block", "clientport": 42514, "message": "<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=28.37.199.175 dst=86.247.140.195 protocol=udp sport=42514 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "28.37.199.175", "serverIP": "86.247.140.195" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=28.37.199.175 dst=86.247.140.195 protocol=udp sport=42514 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1686787028.654984031 M61_MX67C_Savannah l7_firewall src=28.37.199.175 dst=86.247.140.195 protocol=udp sport=42514 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 42514 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 28.37.199.175 serverIP: 86.247.140.195
Explain this syslog message
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=154.149.74.104 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=120.86.21.99 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.86.21.99 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53048, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1691514915772 ", "message": "<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=154.149.74.104 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=120.86.21.99 spt=53048 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.86.21.99 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "ProxyIP:209.97.143.186", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "120.86.21.99", "serverIP": "154.149.74.104", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=154.149.74.104 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=120.86.21.99 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.86.21.99 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=154.149.74.104 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=120.86.21.99 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.86.21.99 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53048 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1691514915772 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:209.97.143.186', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 120.86.21.99 serverIP: 154.149.74.104 userName: -
Explain this syslog message
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=241.113.148.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.241.57.151 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.241.57.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53048, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1691514915772 ", "message": "<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=241.113.148.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=151.241.57.151 spt=53048 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.241.57.151 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "ProxyIP:209.97.143.186", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "151.241.57.151", "serverIP": "241.113.148.73", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=241.113.148.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.241.57.151 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.241.57.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=241.113.148.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.241.57.151 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.241.57.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53048 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1691514915772 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:209.97.143.186', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 151.241.57.151 serverIP: 241.113.148.73 userName: -
Explain this syslog message
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.102.19.22 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.115.166.254 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.115.166.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53048, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1691514915772 ", "message": "<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.102.19.22 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=252.115.166.254 spt=53048 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.115.166.254 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "ProxyIP:209.97.143.186", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "252.115.166.254", "serverIP": "239.102.19.22", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.102.19.22 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.115.166.254 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.115.166.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 8 12:15:15 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=239.102.19.22 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=252.115.166.254 spt=53048 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:15 rt=1691514915772 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=189d6254bb2-ecf4dcac cn2=53048 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=252.115.166.254 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53048 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1691514915772 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:209.97.143.186', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 252.115.166.254 serverIP: 239.102.19.22 userName: -
Explain this syslog message
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.66.113.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.135.221.227 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.135.221.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53070, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1691514917742 ", "message": "<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.66.113.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=79.135.221.227 spt=53070 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication=\"StatusCake_Pagespeed_indev\" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.135.221.227 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "ProxyIP:209.97.143.186", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "79.135.221.227", "serverIP": "45.66.113.97", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.66.113.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.135.221.227 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.135.221.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=45.66.113.97 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.135.221.227 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.135.221.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53070 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1691514917742 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:209.97.143.186', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 79.135.221.227 serverIP: 45.66.113.97 userName: -
Explain this syslog message
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=21.5.213.106 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.85.84.147 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.85.84.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53070, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1691514917742 ", "message": "<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=21.5.213.106 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=184.85.84.147 spt=53070 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication=\"StatusCake_Pagespeed_indev\" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.85.84.147 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "ProxyIP:209.97.143.186", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "184.85.84.147", "serverIP": "21.5.213.106", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=21.5.213.106 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.85.84.147 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.85.84.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=21.5.213.106 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.85.84.147 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.85.84.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53070 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1691514917742 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:209.97.143.186', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 184.85.84.147 serverIP: 21.5.213.106 userName: -
Explain this syslog message
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=146.219.98.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=234.68.212.242 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.68.212.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53070, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1691514917742 ", "message": "<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=146.219.98.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=234.68.212.242 spt=53070 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication=\"StatusCake_Pagespeed_indev\" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.68.212.242 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "ProxyIP:209.97.143.186", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "234.68.212.242", "serverIP": "146.219.98.175", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=146.219.98.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=234.68.212.242 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.68.212.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 8 12:15:17 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=146.219.98.175 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=234.68.212.242 spt=53070 requestMethod=GET app=TLSv1.2 requestContext="-" start=Aug 08 2023 12:15:17 rt=1691514917742 request=/ requestClientApplication="StatusCake_Pagespeed_indev" dvchost=WAFirewall externalId=189d625536e-1bc36f25 cn2=53070 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=234.68.212.242 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53070 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1691514917742 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:209.97.143.186', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 234.68.212.242 serverIP: 146.219.98.175 userName: -
Explain this syslog message
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=230.125.208.88 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=245.209.44.166 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=245.209.44.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:185.158.113.63", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=230.125.208.88 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=245.209.44.166 spt=54864 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0\" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=245.209.44.166 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1663241712007 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/logo.php", "clientport": 54864, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "245.209.44.166", "serverIP": "230.125.208.88", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=230.125.208.88 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=245.209.44.166 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=245.209.44.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=230.125.208.88 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=245.209.44.166 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=245.209.44.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.158.113.63', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1663241712007 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /logo.php clientport: 54864 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 245.209.44.166 serverIP: 230.125.208.88 userName: -
Explain this syslog message
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=137.77.215.138 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=49.106.129.92 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.106.129.92 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:185.158.113.63", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=137.77.215.138 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=49.106.129.92 spt=54864 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0\" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.106.129.92 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1663241712007 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/logo.php", "clientport": 54864, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "49.106.129.92", "serverIP": "137.77.215.138", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=137.77.215.138 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=49.106.129.92 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.106.129.92 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=137.77.215.138 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=49.106.129.92 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.106.129.92 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.158.113.63', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1663241712007 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /logo.php clientport: 54864 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 49.106.129.92 serverIP: 137.77.215.138 userName: -
Explain this syslog message
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=60.214.11.141 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.130.170.190 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.130.170.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:185.158.113.63", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=60.214.11.141 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=139.130.170.190 spt=54864 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0\" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.130.170.190 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1663241712007 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/logo.php", "clientport": 54864, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "139.130.170.190", "serverIP": "60.214.11.141", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=60.214.11.141 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.130.170.190 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.130.170.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 15 06:35:12 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=60.214.11.141 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.130.170.190 spt=54864 requestMethod=GET app=HTTP requestContext="-" start=Sep 15 2022 06:35:12 rt=1663241712007 request=/logo.php requestClientApplication="Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" dvchost=WAFirewall externalId=18340ee7187-e7f98442 cn2=54864 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.130.170.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.158.113.63', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1663241712007 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /logo.php clientport: 54864 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 139.130.170.190 serverIP: 60.214.11.141 userName: -
Explain this syslog message
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699155297|access denied|188.114.100.169|https://shareholders.stark.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 5 03:34:57", "message": "<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699155297|access denied|188.114.100.169|https://shareholders.stark.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699155297", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "188.114.100.169" }
Create a JSON artifact from the message
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699155297|access denied|188.114.100.169|https://shareholders.stark.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699155297|access denied|188.114.100.169|https://shareholders.stark.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 5 03:34:57 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699155297 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 188.114.100.169
Explain this syslog message
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699155297|access denied|185.223.90.145|https://shareholders.wayne.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 5 03:34:57", "message": "<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699155297|access denied|185.223.90.145|https://shareholders.wayne.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699155297", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "185.223.90.145" }
Create a JSON artifact from the message
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699155297|access denied|185.223.90.145|https://shareholders.wayne.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message