input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=36.232.225.165 dpt=443 act=DENY msg=["-"] duser="-" src=22.249.251.73 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=22.249.251.73 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 38286, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1698402143431 ", "message": "<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=36.232.225.165 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=22.249.251.73 spt=38286 requestMethod=\"-\" app=TLSv1.2 requestContext=\"-\" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=22.249.251.73 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "ProxyIP:104.248.130.34", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "22.249.251.73", "serverIP": "36.232.225.165", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=36.232.225.165 dpt=443 act=DENY msg=["-"] duser="-" src=22.249.251.73 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=22.249.251.73 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=36.232.225.165 dpt=443 act=DENY msg=["-"] duser="-" src=22.249.251.73 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=22.249.251.73 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 38286 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1698402143431 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'ProxyIP:104.248.130.34', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 22.249.251.73 serverIP: 36.232.225.165 userName: -
Explain this syslog message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=137.226.156.106 dpt=443 act=DENY msg=["-"] duser="-" src=2.66.120.58 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=2.66.120.58 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 38286, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1698402143431 ", "message": "<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=137.226.156.106 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=2.66.120.58 spt=38286 requestMethod=\"-\" app=TLSv1.2 requestContext=\"-\" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=2.66.120.58 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "ProxyIP:104.248.130.34", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "2.66.120.58", "serverIP": "137.226.156.106", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=137.226.156.106 dpt=443 act=DENY msg=["-"] duser="-" src=2.66.120.58 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=2.66.120.58 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=137.226.156.106 dpt=443 act=DENY msg=["-"] duser="-" src=2.66.120.58 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=2.66.120.58 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 38286 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1698402143431 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'ProxyIP:104.248.130.34', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 2.66.120.58 serverIP: 137.226.156.106 userName: -
Explain this syslog message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=223.148.92.137 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=104.62.244.15 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.62.244.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53688, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1693073021295 ", "message": "<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=223.148.92.137 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=104.62.244.15 spt=53688 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.62.244.15 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:83.97.73.87", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "104.62.244.15", "serverIP": "223.148.92.137", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=223.148.92.137 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=104.62.244.15 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.62.244.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=223.148.92.137 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=104.62.244.15 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.62.244.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53688 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1693073021295 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:83.97.73.87', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 104.62.244.15 serverIP: 223.148.92.137 userName: -
Explain this syslog message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=97.196.196.182 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=195.2.184.157 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=195.2.184.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53688, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1693073021295 ", "message": "<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=97.196.196.182 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=195.2.184.157 spt=53688 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=195.2.184.157 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:83.97.73.87", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "195.2.184.157", "serverIP": "97.196.196.182", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=97.196.196.182 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=195.2.184.157 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=195.2.184.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=97.196.196.182 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=195.2.184.157 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=195.2.184.157 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53688 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1693073021295 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:83.97.73.87', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 195.2.184.157 serverIP: 97.196.196.182 userName: -
Explain this syslog message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=31.209.125.124 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=80.24.38.110 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=80.24.38.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53688, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1693073021295 ", "message": "<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=31.209.125.124 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=80.24.38.110 spt=53688 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=80.24.38.110 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:83.97.73.87", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "80.24.38.110", "serverIP": "31.209.125.124", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=31.209.125.124 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=80.24.38.110 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=80.24.38.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=31.209.125.124 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=80.24.38.110 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=80.24.38.110 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53688 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1693073021295 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:83.97.73.87', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 80.24.38.110 serverIP: 31.209.125.124 userName: -
Explain this syslog message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=231.88.183.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=73.166.46.224 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=73.166.46.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53688, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1693073021295 ", "message": "<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=231.88.183.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=73.166.46.224 spt=53688 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=73.166.46.224 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:83.97.73.87", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "73.166.46.224", "serverIP": "231.88.183.48", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=231.88.183.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=73.166.46.224 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=73.166.46.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=231.88.183.48 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=73.166.46.224 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=73.166.46.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53688 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1693073021295 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:83.97.73.87', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 73.166.46.224 serverIP: 231.88.183.48 userName: -
Explain this syslog message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.178.71.6 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=243.24.144.85 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=243.24.144.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53688, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1693073021295 ", "message": "<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.178.71.6 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=243.24.144.85 spt=53688 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=243.24.144.85 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:83.97.73.87", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "243.24.144.85", "serverIP": "148.178.71.6", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.178.71.6 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=243.24.144.85 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=243.24.144.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 26 13:03:41 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=148.178.71.6 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=243.24.144.85 spt=53688 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 26 2023 13:03:41 rt=1693073021295 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18a3304195c-e99a3f31 cn2=53688 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=243.24.144.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53688 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1693073021295 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:83.97.73.87', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 243.24.144.85 serverIP: 148.178.71.6 userName: -
Explain this syslog message
<185>Aug 31 20:41:32 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=74.249.46.205 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://tomgirls.xyz/hardcore/50.html "] duser="-" src=238.90.186.45 spt=64194 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 31 2022 20:41:32 rt=1661996492660 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f6b5e773-dfdc898f cn2=64194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=238.90.186.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleType:GLOBAL", "barracuda_waf", "REMOTE_FILE_INCLUSION", "cef", "FollowUpAction:NONE", "barracuda_waf_REMOTE_FILE_INCLUSION", "ProxyIP:66.249.75.173", "AttackGroup:Injection Attacks", "rfc3164", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 31 20:41:32 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=74.249.46.205 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"https\\\\:/\" Parameter\\=\"F\" value\\=\"https\\\\://tomgirls.xyz/hardcore/50.html \"] duser=\"-\" src=238.90.186.45 spt=64194 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 31 2022 20:41:32 rt=1661996492660 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=182f6b5e773-dfdc898f cn2=64194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=238.90.186.45 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1661996492660 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "REMOTE_FILE_INCLUSION", "severitycode": 9, "fqdn": "/comm/AndarTrack.jsp", "clientport": 64194, "vendorcode": "164", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "238.90.186.45", "serverIP": "74.249.46.205", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 31 20:41:32 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=74.249.46.205 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://tomgirls.xyz/hardcore/50.html "] duser="-" src=238.90.186.45 spt=64194 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 31 2022 20:41:32 rt=1661996492660 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f6b5e773-dfdc898f cn2=64194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=238.90.186.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 31 20:41:32 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=74.249.46.205 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://tomgirls.xyz/hardcore/50.html "] duser="-" src=238.90.186.45 spt=64194 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 31 2022 20:41:32 rt=1661996492660 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f6b5e773-dfdc898f cn2=64194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=238.90.186.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleType:GLOBAL', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'ProxyIP:66.249.75.173', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1661996492660 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: REMOTE_FILE_INCLUSION severitycode: 9 fqdn: /comm/AndarTrack.jsp clientport: 64194 vendorcode: 164 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 238.90.186.45 serverIP: 74.249.46.205 userName: -
Explain this syslog message
<185>Aug 31 20:41:32 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=60.63.254.82 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://tomgirls.xyz/hardcore/50.html "] duser="-" src=219.100.89.94 spt=64194 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 31 2022 20:41:32 rt=1661996492660 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f6b5e773-dfdc898f cn2=64194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=219.100.89.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleType:GLOBAL", "barracuda_waf", "REMOTE_FILE_INCLUSION", "cef", "FollowUpAction:NONE", "barracuda_waf_REMOTE_FILE_INCLUSION", "ProxyIP:66.249.75.173", "AttackGroup:Injection Attacks", "rfc3164", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Aug 31 20:41:32 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=60.63.254.82 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"https\\\\:/\" Parameter\\=\"F\" value\\=\"https\\\\://tomgirls.xyz/hardcore/50.html \"] duser=\"-\" src=219.100.89.94 spt=64194 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Aug 31 2022 20:41:32 rt=1661996492660 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=182f6b5e773-dfdc898f cn2=64194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=219.100.89.94 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1661996492660 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "REMOTE_FILE_INCLUSION", "severitycode": 9, "fqdn": "/comm/AndarTrack.jsp", "clientport": 64194, "vendorcode": "164", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "219.100.89.94", "serverIP": "60.63.254.82", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 31 20:41:32 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=60.63.254.82 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://tomgirls.xyz/hardcore/50.html "] duser="-" src=219.100.89.94 spt=64194 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 31 2022 20:41:32 rt=1661996492660 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f6b5e773-dfdc898f cn2=64194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=219.100.89.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 31 20:41:32 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=60.63.254.82 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://tomgirls.xyz/hardcore/50.html "] duser="-" src=219.100.89.94 spt=64194 requestMethod=GET app=TLSv1.3 requestContext="-" start=Aug 31 2022 20:41:32 rt=1661996492660 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f6b5e773-dfdc898f cn2=64194 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=219.100.89.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleType:GLOBAL', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'ProxyIP:66.249.75.173', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1661996492660 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: REMOTE_FILE_INCLUSION severitycode: 9 fqdn: /comm/AndarTrack.jsp clientport: 64194 vendorcode: 164 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 219.100.89.94 serverIP: 60.63.254.82 userName: -
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:16:03.261Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:16:04.609Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t141.22.19.69\n\tSource Port:\t\t50607\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"141.22.19.69","IpPort":"50607","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315284336,"task":"Logon"}}
{ "action": "Logon", "clientport": 50607, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-13T14:16:03.261Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-13T14:16:04.609Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t141.22.19.69\\n\\tSource Port:\\t\\t50607\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"Nordc-DC-03.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"141.22.19.69\",\"IpPort\":\"50607\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":3588}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1315284336,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1315284336", "streamName": "microsoft-windows-security-auditing", "clientIP": "141.22.19.69", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:16:03.261Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:16:04.609Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t141.22.19.69\n\tSource Port:\t\t50607\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"141.22.19.69","IpPort":"50607","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315284336,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:16:03.261Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:16:04.609Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t141.22.19.69\n\tSource Port:\t\t50607\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"141.22.19.69","IpPort":"50607","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315284336,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 50607 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1315284336 streamName: microsoft-windows-security-auditing clientIP: 141.22.19.69 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:16:03.261Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:16:04.609Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t22.163.192.240\n\tSource Port:\t\t50607\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"Nordc-DC-03.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"22.163.192.240","IpPort":"50607","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315284336,"task":"Logon"}}
{ "action": "Logon", "clientport": 50607, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-13T14:16:03.261Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-13T14:16:04.609Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t22.163.192.240\\n\\tSource Port:\\t\\t50607\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"Nordc-DC-03.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"22.163.192.240\",\"IpPort\":\"50607\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":3588}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1315284336,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1315284336", "streamName": "microsoft-windows-security-auditing", "clientIP": "22.163.192.240", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:16:03.261Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:16:04.609Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t22.163.192.240\n\tSource Port:\t\t50607\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"Nordc-DC-03.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"22.163.192.240","IpPort":"50607","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315284336,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:16:03.261Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:16:04.609Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t22.163.192.240\n\tSource Port:\t\t50607\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"Nordc-DC-03.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"22.163.192.240","IpPort":"50607","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315284336,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 50607 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1315284336 streamName: microsoft-windows-security-auditing clientIP: 22.163.192.240 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:16:03.261Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:16:04.609Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t2.163.52.125\n\tSource Port:\t\t50607\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"Nordc-DC-03.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"2.163.52.125","IpPort":"50607","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315284336,"task":"Logon"}}
{ "action": "Logon", "clientport": 50607, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-13T14:16:03.261Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-13T14:16:04.609Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t2.163.52.125\\n\\tSource Port:\\t\\t50607\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"Nordc-DC-03.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.acme.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"2.163.52.125\",\"IpPort\":\"50607\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":3588}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1315284336,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1315284336", "streamName": "microsoft-windows-security-auditing", "clientIP": "2.163.52.125", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:16:03.261Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:16:04.609Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t2.163.52.125\n\tSource Port:\t\t50607\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"Nordc-DC-03.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"2.163.52.125","IpPort":"50607","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315284336,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:16:03.261Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:16:04.609Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t2.163.52.125\n\tSource Port:\t\t50607\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"Nordc-DC-03.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"2.163.52.125","IpPort":"50607","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315284336,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 50607 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1315284336 streamName: microsoft-windows-security-auditing clientIP: 2.163.52.125 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:16:03.261Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:16:04.609Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t74.179.44.130\n\tSource Port:\t\t50607\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"Nordc-DC-03.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"74.179.44.130","IpPort":"50607","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315284336,"task":"Logon"}}
{ "action": "Logon", "clientport": 50607, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-13T14:16:03.261Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-13T14:16:04.609Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t74.179.44.130\\n\\tSource Port:\\t\\t50607\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"Nordc-DC-03.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.acme.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"74.179.44.130\",\"IpPort\":\"50607\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":3588}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1315284336,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1315284336", "streamName": "microsoft-windows-security-auditing", "clientIP": "74.179.44.130", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:16:03.261Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:16:04.609Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t74.179.44.130\n\tSource Port:\t\t50607\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"Nordc-DC-03.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"74.179.44.130","IpPort":"50607","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315284336,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:16:03.261Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:16:04.609Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t74.179.44.130\n\tSource Port:\t\t50607\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"Nordc-DC-03.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"74.179.44.130","IpPort":"50607","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":3588}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315284336,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 50607 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1315284336 streamName: microsoft-windows-security-auditing clientIP: 74.179.44.130 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:11:30.150Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:11:30.557Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t128.184.217.107\n\tSource Port:\t\t64991\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"Nordc-DC-03.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"128.184.217.107","IpPort":"64991","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":18828}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315281812,"task":"Logon"}}
{ "action": "Logon", "clientport": 64991, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-13T14:11:30.150Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-13T14:11:30.557Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t128.184.217.107\\n\\tSource Port:\\t\\t64991\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"Nordc-DC-03.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"128.184.217.107\",\"IpPort\":\"64991\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":18828}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1315281812,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1315281812", "streamName": "microsoft-windows-security-auditing", "clientIP": "128.184.217.107", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:11:30.150Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:11:30.557Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t128.184.217.107\n\tSource Port:\t\t64991\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"Nordc-DC-03.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"128.184.217.107","IpPort":"64991","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":18828}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315281812,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:11:30.150Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:11:30.557Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t128.184.217.107\n\tSource Port:\t\t64991\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"Nordc-DC-03.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"128.184.217.107","IpPort":"64991","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":18828}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315281812,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 64991 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1315281812 streamName: microsoft-windows-security-auditing clientIP: 128.184.217.107 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:11:30.150Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:11:30.557Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t7.235.122.124\n\tSource Port:\t\t64991\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"Nordc-DC-03.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"7.235.122.124","IpPort":"64991","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":18828}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315281812,"task":"Logon"}}
{ "action": "Logon", "clientport": 64991, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-13T14:11:30.150Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-13T14:11:30.557Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t7.235.122.124\\n\\tSource Port:\\t\\t64991\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"Nordc-DC-03.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"7.235.122.124\",\"IpPort\":\"64991\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":18828}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1315281812,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1315281812", "streamName": "microsoft-windows-security-auditing", "clientIP": "7.235.122.124", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:11:30.150Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:11:30.557Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t7.235.122.124\n\tSource Port:\t\t64991\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"Nordc-DC-03.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"7.235.122.124","IpPort":"64991","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":18828}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315281812,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:11:30.150Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:11:30.557Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t7.235.122.124\n\tSource Port:\t\t64991\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"Nordc-DC-03.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"7.235.122.124","IpPort":"64991","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":18828}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315281812,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 64991 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1315281812 streamName: microsoft-windows-security-auditing clientIP: 7.235.122.124 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:11:30.150Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:11:30.557Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t156.244.249.105\n\tSource Port:\t\t64991\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"156.244.249.105","IpPort":"64991","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":18828}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315281812,"task":"Logon"}}
{ "action": "Logon", "clientport": 64991, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-13T14:11:30.150Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-13T14:11:30.557Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t156.244.249.105\\n\\tSource Port:\\t\\t64991\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"Nordc-DC-03.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.wayne.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"156.244.249.105\",\"IpPort\":\"64991\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":18828}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1315281812,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1315281812", "streamName": "microsoft-windows-security-auditing", "clientIP": "156.244.249.105", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:11:30.150Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:11:30.557Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t156.244.249.105\n\tSource Port:\t\t64991\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"156.244.249.105","IpPort":"64991","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":18828}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315281812,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:11:30.150Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:11:30.557Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t156.244.249.105\n\tSource Port:\t\t64991\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"Nordc-DC-03.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"156.244.249.105","IpPort":"64991","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":18828}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315281812,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 64991 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1315281812 streamName: microsoft-windows-security-auditing clientIP: 156.244.249.105 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:11:30.150Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:11:30.557Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t128.221.252.178\n\tSource Port:\t\t64991\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"128.221.252.178","IpPort":"64991","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":18828}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315281812,"task":"Logon"}}
{ "action": "Logon", "clientport": 64991, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-13T14:11:30.150Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-13T14:11:30.557Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t128.221.252.178\\n\\tSource Port:\\t\\t64991\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"Nordc-DC-03.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"128.221.252.178\",\"IpPort\":\"64991\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":18828}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1315281812,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1315281812", "streamName": "microsoft-windows-security-auditing", "clientIP": "128.221.252.178", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:11:30.150Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:11:30.557Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t128.221.252.178\n\tSource Port:\t\t64991\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"128.221.252.178","IpPort":"64991","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":18828}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315281812,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-13T14:11:30.150Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-13T14:11:30.557Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t128.221.252.178\n\tSource Port:\t\t64991\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"128.221.252.178","IpPort":"64991","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":18828}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1315281812,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 64991 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1315281812 streamName: microsoft-windows-security-auditing clientIP: 128.221.252.178 userName: alice
Explain this syslog message
<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=30.204.237.178 dst=191.124.68.92 protocol=icmp type=0 decision=blocked
{ "action": "block", "message": "<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=30.204.237.178 dst=191.124.68.92 protocol=icmp type=0 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 1, "senderhost": "192.168.2.250", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "30.204.237.178", "serverIP": "191.124.68.92" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=30.204.237.178 dst=191.124.68.92 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=30.204.237.178 dst=191.124.68.92 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block messagetype: anomalous_behavior program: l7_firewall protocol: 1 senderhost: 192.168.2.250 sensitivity: normal sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 30.204.237.178 serverIP: 191.124.68.92
Explain this syslog message
<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=14.3.42.139 dst=231.209.134.36 protocol=icmp type=0 decision=blocked
{ "action": "block", "message": "<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=14.3.42.139 dst=231.209.134.36 protocol=icmp type=0 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 1, "senderhost": "192.168.2.250", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "14.3.42.139", "serverIP": "231.209.134.36" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=14.3.42.139 dst=231.209.134.36 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=14.3.42.139 dst=231.209.134.36 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block messagetype: anomalous_behavior program: l7_firewall protocol: 1 senderhost: 192.168.2.250 sensitivity: normal sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 14.3.42.139 serverIP: 231.209.134.36
Explain this syslog message
<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=102.36.185.126 dst=197.173.7.1 protocol=icmp type=0 decision=blocked
{ "action": "block", "message": "<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=102.36.185.126 dst=197.173.7.1 protocol=icmp type=0 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 1, "senderhost": "192.168.2.250", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "102.36.185.126", "serverIP": "197.173.7.1" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=102.36.185.126 dst=197.173.7.1 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=102.36.185.126 dst=197.173.7.1 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block messagetype: anomalous_behavior program: l7_firewall protocol: 1 senderhost: 192.168.2.250 sensitivity: normal sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 102.36.185.126 serverIP: 197.173.7.1
Explain this syslog message
<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=230.53.90.123 dst=203.66.193.223 protocol=icmp type=0 decision=blocked
{ "action": "block", "message": "<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=230.53.90.123 dst=203.66.193.223 protocol=icmp type=0 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 1, "senderhost": "192.168.2.250", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "230.53.90.123", "serverIP": "203.66.193.223" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=230.53.90.123 dst=203.66.193.223 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1689712690.976412135 NORDC_MX400_1 l7_firewall src=230.53.90.123 dst=203.66.193.223 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block messagetype: anomalous_behavior program: l7_firewall protocol: 1 senderhost: 192.168.2.250 sensitivity: normal sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 230.53.90.123 serverIP: 203.66.193.223
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=33.85.84.139 dst=58.206.120.252 protocol=tcp sport=61254 dport=443 decision=blocked
{ "action": "block", "clientport": 61254, "message": "<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=33.85.84.139 dst=58.206.120.252 protocol=tcp sport=61254 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "33.85.84.139", "serverIP": "58.206.120.252" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=33.85.84.139 dst=58.206.120.252 protocol=tcp sport=61254 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=33.85.84.139 dst=58.206.120.252 protocol=tcp sport=61254 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 61254 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 33.85.84.139 serverIP: 58.206.120.252
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=114.138.226.63 dst=251.139.51.99 protocol=tcp sport=61254 dport=443 decision=blocked
{ "action": "block", "clientport": 61254, "message": "<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=114.138.226.63 dst=251.139.51.99 protocol=tcp sport=61254 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "114.138.226.63", "serverIP": "251.139.51.99" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=114.138.226.63 dst=251.139.51.99 protocol=tcp sport=61254 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=114.138.226.63 dst=251.139.51.99 protocol=tcp sport=61254 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 61254 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 114.138.226.63 serverIP: 251.139.51.99
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=195.133.104.11 dst=222.206.91.38 protocol=tcp sport=61254 dport=443 decision=blocked
{ "action": "block", "clientport": 61254, "message": "<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=195.133.104.11 dst=222.206.91.38 protocol=tcp sport=61254 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "195.133.104.11", "serverIP": "222.206.91.38" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=195.133.104.11 dst=222.206.91.38 protocol=tcp sport=61254 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=195.133.104.11 dst=222.206.91.38 protocol=tcp sport=61254 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 61254 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 195.133.104.11 serverIP: 222.206.91.38
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=35.67.191.57 dst=188.101.245.153 protocol=tcp sport=61254 dport=443 decision=blocked
{ "action": "block", "clientport": 61254, "message": "<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=35.67.191.57 dst=188.101.245.153 protocol=tcp sport=61254 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "35.67.191.57", "serverIP": "188.101.245.153" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=35.67.191.57 dst=188.101.245.153 protocol=tcp sport=61254 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687449383.792280423 NORDC_MX400_1 l7_firewall src=35.67.191.57 dst=188.101.245.153 protocol=tcp sport=61254 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 61254 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 35.67.191.57 serverIP: 188.101.245.153
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614262,"originType":"AD Users","internalIp":"65.159.210.20","externalIp":"154.46.57.212","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-19T19:12:58.000Z"} ::: clientIP=65.159.210.20 ::: serverIP=154.46.57.212 ::: userName=fish ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-19T19:12:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410614262,\"originType\":\"AD Users\",\"internalIp\":\"65.159.210.20\",\"externalIp\":\"154.46.57.212\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-19T19:12:58.000Z\"} ::: clientIP=65.159.210.20 ::: serverIP=154.46.57.212 ::: userName=fish ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "65.159.210.20", "serverIP": "154.46.57.212", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614262,"originType":"AD Users","internalIp":"65.159.210.20","externalIp":"154.46.57.212","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-19T19:12:58.000Z"} ::: clientIP=65.159.210.20 ::: serverIP=154.46.57.212 ::: userName=fish ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614262,"originType":"AD Users","internalIp":"65.159.210.20","externalIp":"154.46.57.212","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-19T19:12:58.000Z"} ::: clientIP=65.159.210.20 ::: serverIP=154.46.57.212 ::: userName=fish ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-19T19:12:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 65.159.210.20 serverIP: 154.46.57.212 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614262,"originType":"AD Users","internalIp":"161.72.24.138","externalIp":"79.4.229.160","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-19T19:12:58.000Z"} ::: clientIP=161.72.24.138 ::: serverIP=79.4.229.160 ::: userName=charlie ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-19T19:12:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410614262,\"originType\":\"AD Users\",\"internalIp\":\"161.72.24.138\",\"externalIp\":\"79.4.229.160\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-19T19:12:58.000Z\"} ::: clientIP=161.72.24.138 ::: serverIP=79.4.229.160 ::: userName=charlie ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "161.72.24.138", "serverIP": "79.4.229.160", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614262,"originType":"AD Users","internalIp":"161.72.24.138","externalIp":"79.4.229.160","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-19T19:12:58.000Z"} ::: clientIP=161.72.24.138 ::: serverIP=79.4.229.160 ::: userName=charlie ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614262,"originType":"AD Users","internalIp":"161.72.24.138","externalIp":"79.4.229.160","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-19T19:12:58.000Z"} ::: clientIP=161.72.24.138 ::: serverIP=79.4.229.160 ::: userName=charlie ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-19T19:12:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 161.72.24.138 serverIP: 79.4.229.160 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614262,"originType":"AD Users","internalIp":"17.142.140.3","externalIp":"162.8.123.254","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-19T19:12:58.000Z"} ::: clientIP=17.142.140.3 ::: serverIP=162.8.123.254 ::: userName=janedoe ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-19T19:12:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410614262,\"originType\":\"AD Users\",\"internalIp\":\"17.142.140.3\",\"externalIp\":\"162.8.123.254\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-19T19:12:58.000Z\"} ::: clientIP=17.142.140.3 ::: serverIP=162.8.123.254 ::: userName=janedoe ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "17.142.140.3", "serverIP": "162.8.123.254", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614262,"originType":"AD Users","internalIp":"17.142.140.3","externalIp":"162.8.123.254","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-19T19:12:58.000Z"} ::: clientIP=17.142.140.3 ::: serverIP=162.8.123.254 ::: userName=janedoe ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614262,"originType":"AD Users","internalIp":"17.142.140.3","externalIp":"162.8.123.254","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-19T19:12:58.000Z"} ::: clientIP=17.142.140.3 ::: serverIP=162.8.123.254 ::: userName=janedoe ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-19T19:12:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 17.142.140.3 serverIP: 162.8.123.254 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614262,"originType":"AD Users","internalIp":"242.205.149.38","externalIp":"29.64.251.225","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-19T19:12:58.000Z"} ::: clientIP=242.205.149.38 ::: serverIP=29.64.251.225 ::: userName=charlie ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-19T19:12:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410614262,\"originType\":\"AD Users\",\"internalIp\":\"242.205.149.38\",\"externalIp\":\"29.64.251.225\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-19T19:12:58.000Z\"} ::: clientIP=242.205.149.38 ::: serverIP=29.64.251.225 ::: userName=charlie ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "242.205.149.38", "serverIP": "29.64.251.225", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614262,"originType":"AD Users","internalIp":"242.205.149.38","externalIp":"29.64.251.225","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-19T19:12:58.000Z"} ::: clientIP=242.205.149.38 ::: serverIP=29.64.251.225 ::: userName=charlie ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614262,"originType":"AD Users","internalIp":"242.205.149.38","externalIp":"29.64.251.225","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-19T19:12:58.000Z"} ::: clientIP=242.205.149.38 ::: serverIP=29.64.251.225 ::: userName=charlie ::: created_at=2022-05-19T19:12:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-19T19:12:58.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-19T19:12:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 242.205.149.38 serverIP: 29.64.251.225 userName: charlie
Explain this syslog message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=199.0.162.125 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=161.28.141.167 spt=34398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=161.28.141.167 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "SessionID:-", "FollowUpAction:NONE", "cef", "ProxyIP:167.94.145.58" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=199.0.162.125 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=161.28.141.167 spt=34398 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=161.28.141.167 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488495378 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 34398, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "161.28.141.167", "serverIP": "199.0.162.125", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=199.0.162.125 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=161.28.141.167 spt=34398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=161.28.141.167 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=199.0.162.125 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=161.28.141.167 spt=34398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=161.28.141.167 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'SessionID:-', 'FollowUpAction:NONE', 'cef', 'ProxyIP:167.94.145.58'] productids: [0] sourceinfo: unknown localstarttime: 1677488495378 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 34398 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 161.28.141.167 serverIP: 199.0.162.125 userName: -
Explain this syslog message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=200.97.200.68 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=159.167.45.79 spt=51980 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication="Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.167.45.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "SessionID:-", "FollowUpAction:NONE", "cef", "ProxyIP:167.94.145.58" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=200.97.200.68 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=159.167.45.79 spt=51980 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication=\"Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)\" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.167.45.79 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488495788 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 51980, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "159.167.45.79", "serverIP": "200.97.200.68", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=200.97.200.68 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=159.167.45.79 spt=51980 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication="Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.167.45.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=200.97.200.68 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=159.167.45.79 spt=51980 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication="Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.167.45.79 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'SessionID:-', 'FollowUpAction:NONE', 'cef', 'ProxyIP:167.94.145.58'] productids: [0] sourceinfo: unknown localstarttime: 1677488495788 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 51980 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 159.167.45.79 serverIP: 200.97.200.68 userName: -
Explain this syslog message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=237.128.63.236 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=172.175.184.27 spt=34398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=172.175.184.27 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "SessionID:-", "FollowUpAction:NONE", "cef", "ProxyIP:167.94.145.58" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=237.128.63.236 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=172.175.184.27 spt=34398 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=172.175.184.27 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488495378 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 34398, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "172.175.184.27", "serverIP": "237.128.63.236", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=237.128.63.236 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=172.175.184.27 spt=34398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=172.175.184.27 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=237.128.63.236 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=172.175.184.27 spt=34398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=172.175.184.27 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'SessionID:-', 'FollowUpAction:NONE', 'cef', 'ProxyIP:167.94.145.58'] productids: [0] sourceinfo: unknown localstarttime: 1677488495378 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 34398 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 172.175.184.27 serverIP: 237.128.63.236 userName: -
Explain this syslog message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=240.83.157.66 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=7.230.124.175 spt=51980 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication="Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.230.124.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "SessionID:-", "FollowUpAction:NONE", "cef", "ProxyIP:167.94.145.58" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=240.83.157.66 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=7.230.124.175 spt=51980 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication=\"Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)\" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.230.124.175 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488495788 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 51980, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "7.230.124.175", "serverIP": "240.83.157.66", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=240.83.157.66 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=7.230.124.175 spt=51980 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication="Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.230.124.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=240.83.157.66 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=7.230.124.175 spt=51980 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication="Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.230.124.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'SessionID:-', 'FollowUpAction:NONE', 'cef', 'ProxyIP:167.94.145.58'] productids: [0] sourceinfo: unknown localstarttime: 1677488495788 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 51980 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 7.230.124.175 serverIP: 240.83.157.66 userName: -
Explain this syslog message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=236.2.75.223 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=150.59.94.190 spt=34398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.59.94.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "SessionID:-", "FollowUpAction:NONE", "cef", "ProxyIP:167.94.145.58" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=236.2.75.223 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=150.59.94.190 spt=34398 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.59.94.190 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488495378 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 34398, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "150.59.94.190", "serverIP": "236.2.75.223", "userName": "-" }
Create a JSON artifact from the message