input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=236.2.75.223 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=150.59.94.190 spt=34398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.59.94.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=236.2.75.223 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=150.59.94.190 spt=34398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.59.94.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'SessionID:-', 'FollowUpAction:NONE', 'cef', 'ProxyIP:167.94.145.58'] productids: [0] sourceinfo: unknown localstarttime: 1677488495378 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 34398 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 150.59.94.190 serverIP: 236.2.75.223 userName: -
Explain this syslog message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.87.201.148 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=177.168.191.225 spt=51980 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication="Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.168.191.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "SessionID:-", "FollowUpAction:NONE", "cef", "ProxyIP:167.94.145.58" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.87.201.148 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=177.168.191.225 spt=51980 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication=\"Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)\" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.168.191.225 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488495788 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 51980, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "177.168.191.225", "serverIP": "34.87.201.148", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.87.201.148 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=177.168.191.225 spt=51980 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication="Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.168.191.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.87.201.148 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=177.168.191.225 spt=51980 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication="Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.168.191.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'SessionID:-', 'FollowUpAction:NONE', 'cef', 'ProxyIP:167.94.145.58'] productids: [0] sourceinfo: unknown localstarttime: 1677488495788 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 51980 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 177.168.191.225 serverIP: 34.87.201.148 userName: -
Explain this syslog message
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=59.136.19.214 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=39.50.239.193 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=39.50.239.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "cef", "ProxyIP:167.94.145.58" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=59.136.19.214 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=39.50.239.193 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=39.50.239.193 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488496203 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MALFORMED_VERSION", "severitycode": 9, "fqdn": "/*", "clientport": 36598, "vendorcode": "119", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "39.50.239.193", "serverIP": "59.136.19.214", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=59.136.19.214 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=39.50.239.193 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=39.50.239.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=59.136.19.214 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=39.50.239.193 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=39.50.239.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'cef', 'ProxyIP:167.94.145.58'] productids: [0] sourceinfo: unknown localstarttime: 1677488496203 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MALFORMED_VERSION severitycode: 9 fqdn: /* clientport: 36598 vendorcode: 119 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 39.50.239.193 serverIP: 59.136.19.214 userName: -
Explain this syslog message
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=61.207.237.163 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=158.23.83.233 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.23.83.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "cef", "ProxyIP:167.94.145.58" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=61.207.237.163 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=158.23.83.233 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.23.83.233 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488496203 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MALFORMED_VERSION", "severitycode": 9, "fqdn": "/*", "clientport": 36598, "vendorcode": "119", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "158.23.83.233", "serverIP": "61.207.237.163", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=61.207.237.163 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=158.23.83.233 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.23.83.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=61.207.237.163 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=158.23.83.233 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.23.83.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'cef', 'ProxyIP:167.94.145.58'] productids: [0] sourceinfo: unknown localstarttime: 1677488496203 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MALFORMED_VERSION severitycode: 9 fqdn: /* clientport: 36598 vendorcode: 119 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 158.23.83.233 serverIP: 61.207.237.163 userName: -
Explain this syslog message
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=20.233.157.127 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=44.229.135.0 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.229.135.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:134.209.88.168", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=20.233.157.127 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=44.229.135.0 spt=50332 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.229.135.0 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488473271 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/favicon.ico", "clientport": 50332, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "44.229.135.0", "serverIP": "20.233.157.127", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=20.233.157.127 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=44.229.135.0 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.229.135.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=20.233.157.127 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=44.229.135.0 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.229.135.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1677488473271 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /favicon.ico clientport: 50332 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 44.229.135.0 serverIP: 20.233.157.127 userName: -
Explain this syslog message
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=68.121.91.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=162.23.235.100 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=162.23.235.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:134.209.88.168", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=68.121.91.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=162.23.235.100 spt=50332 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=162.23.235.100 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488473271 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/favicon.ico", "clientport": 50332, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "162.23.235.100", "serverIP": "68.121.91.3", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=68.121.91.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=162.23.235.100 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=162.23.235.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=68.121.91.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=162.23.235.100 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=162.23.235.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1677488473271 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /favicon.ico clientport: 50332 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 162.23.235.100 serverIP: 68.121.91.3 userName: -
Explain this syslog message
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.24.200.143 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.209.90.238 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.209.90.238 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:134.209.88.168", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.24.200.143 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=118.209.90.238 spt=50332 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.209.90.238 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488473271 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/favicon.ico", "clientport": 50332, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "118.209.90.238", "serverIP": "150.24.200.143", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.24.200.143 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.209.90.238 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.209.90.238 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.24.200.143 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.209.90.238 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.209.90.238 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1677488473271 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /favicon.ico clientport: 50332 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 118.209.90.238 serverIP: 150.24.200.143 userName: -
Explain this syslog message
<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.197.15.63 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.83.147.153 spt=50342 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.83.147.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:134.209.88.168", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.197.15.63 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=183.83.147.153 spt=50342 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.83.147.153 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488474379 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 50342, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "183.83.147.153", "serverIP": "14.197.15.63", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.197.15.63 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.83.147.153 spt=50342 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.83.147.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.197.15.63 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.83.147.153 spt=50342 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.83.147.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1677488474379 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 50342 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 183.83.147.153 serverIP: 14.197.15.63 userName: -
Explain this syslog message
<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=57.134.187.19 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=94.22.66.240 spt=50342 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.22.66.240 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:134.209.88.168", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=57.134.187.19 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=94.22.66.240 spt=50342 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.22.66.240 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488474379 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 50342, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "94.22.66.240", "serverIP": "57.134.187.19", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=57.134.187.19 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=94.22.66.240 spt=50342 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.22.66.240 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=57.134.187.19 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=94.22.66.240 spt=50342 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.22.66.240 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1677488474379 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 50342 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 94.22.66.240 serverIP: 57.134.187.19 userName: -
Explain this syslog message
<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.57.65.200 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=87.58.248.141 spt=50328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.58.248.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:134.209.88.168", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.57.65.200 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=87.58.248.141 spt=50328 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.58.248.141 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488472913 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 50328, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "87.58.248.141", "serverIP": "87.57.65.200", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.57.65.200 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=87.58.248.141 spt=50328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.58.248.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.57.65.200 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=87.58.248.141 spt=50328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.58.248.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1677488472913 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 50328 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 87.58.248.141 serverIP: 87.57.65.200 userName: -
Explain this syslog message
<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=81.190.7.165 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=150.102.111.113 spt=50328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.102.111.113 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:134.209.88.168", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=81.190.7.165 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=150.102.111.113 spt=50328 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.102.111.113 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488472913 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 50328, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "150.102.111.113", "serverIP": "81.190.7.165", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=81.190.7.165 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=150.102.111.113 spt=50328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.102.111.113 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=81.190.7.165 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=150.102.111.113 spt=50328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.102.111.113 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1677488472913 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 50328 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 150.102.111.113 serverIP: 81.190.7.165 userName: -
Explain this syslog message
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=143.138.139.63 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=99.206.212.123 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=99.206.212.123 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "cef", "ProxyIP:167.94.145.58" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=143.138.139.63 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=99.206.212.123 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=99.206.212.123 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1677488496203 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "MALFORMED_VERSION", "severitycode": 9, "fqdn": "/*", "clientport": 36598, "vendorcode": "119", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "99.206.212.123", "serverIP": "143.138.139.63", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=143.138.139.63 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=99.206.212.123 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=99.206.212.123 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=143.138.139.63 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=99.206.212.123 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=99.206.212.123 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'cef', 'ProxyIP:167.94.145.58'] productids: [0] sourceinfo: unknown localstarttime: 1677488496203 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: MALFORMED_VERSION severitycode: 9 fqdn: /* clientport: 36598 vendorcode: 119 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 99.206.212.123 serverIP: 143.138.139.63 userName: -
Explain this syslog message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=161.80.170.158 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.70.205.196 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.70.205.196 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:77.91.78.56", "RuleID:global" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=161.80.170.158 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=239.70.205.196 spt=52054 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication=\"Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0\" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.70.205.196 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1676429214485 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php", "clientport": 52054, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "239.70.205.196", "serverIP": "161.80.170.158", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=161.80.170.158 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.70.205.196 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.70.205.196 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=161.80.170.158 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.70.205.196 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.70.205.196 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:77.91.78.56', 'RuleID:global'] productids: [0] sourceinfo: unknown localstarttime: 1676429214485 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php clientport: 52054 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 239.70.205.196 serverIP: 161.80.170.158 userName: -
Explain this syslog message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=106.51.246.25 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=71.5.175.15 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.5.175.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:77.91.78.56", "RuleID:global" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=106.51.246.25 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=71.5.175.15 spt=52054 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication=\"Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0\" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.5.175.15 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1676429214485 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php", "clientport": 52054, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "71.5.175.15", "serverIP": "106.51.246.25", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=106.51.246.25 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=71.5.175.15 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.5.175.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=106.51.246.25 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=71.5.175.15 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.5.175.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:77.91.78.56', 'RuleID:global'] productids: [0] sourceinfo: unknown localstarttime: 1676429214485 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php clientport: 52054 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 71.5.175.15 serverIP: 106.51.246.25 userName: -
Explain this syslog message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=152.6.144.132 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=25.244.95.80 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.244.95.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:77.91.78.56", "RuleID:global" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=152.6.144.132 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=25.244.95.80 spt=52054 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication=\"Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0\" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.244.95.80 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1676429214485 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php", "clientport": 52054, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "25.244.95.80", "serverIP": "152.6.144.132", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=152.6.144.132 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=25.244.95.80 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.244.95.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=152.6.144.132 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=25.244.95.80 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.244.95.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:77.91.78.56', 'RuleID:global'] productids: [0] sourceinfo: unknown localstarttime: 1676429214485 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php clientport: 52054 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 25.244.95.80 serverIP: 152.6.144.132 userName: -
Explain this syslog message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=200.74.0.47 dpt=80 act=DENY msg=[] duser="-" src=152.212.13.156 spt=52052 requestMethod="-" app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.212.13.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "ProxyIP:77.91.78.56", "RuleID:global", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=200.74.0.47 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=152.212.13.156 spt=52052 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.212.13.156 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1676429214217 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 52052, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "152.212.13.156", "serverIP": "200.74.0.47", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=200.74.0.47 dpt=80 act=DENY msg=[] duser="-" src=152.212.13.156 spt=52052 requestMethod="-" app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.212.13.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=200.74.0.47 dpt=80 act=DENY msg=[] duser="-" src=152.212.13.156 spt=52052 requestMethod="-" app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.212.13.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'ProxyIP:77.91.78.56', 'RuleID:global', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1676429214217 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 52052 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 152.212.13.156 serverIP: 200.74.0.47 userName: -
Explain this syslog message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=20.138.70.252 dpt=80 act=DENY msg=[] duser="-" src=42.178.166.147 spt=52052 requestMethod="-" app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=42.178.166.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "ProxyIP:77.91.78.56", "RuleID:global", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=20.138.70.252 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=42.178.166.147 spt=52052 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=42.178.166.147 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1676429214217 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "INVALID_METHOD", "severitycode": 9, "fqdn": "/", "clientport": 52052, "vendorcode": "118", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "42.178.166.147", "serverIP": "20.138.70.252", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=20.138.70.252 dpt=80 act=DENY msg=[] duser="-" src=42.178.166.147 spt=52052 requestMethod="-" app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=42.178.166.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=20.138.70.252 dpt=80 act=DENY msg=[] duser="-" src=42.178.166.147 spt=52052 requestMethod="-" app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=42.178.166.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'ProxyIP:77.91.78.56', 'RuleID:global', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] productids: [0] sourceinfo: unknown localstarttime: 1676429214217 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: INVALID_METHOD severitycode: 9 fqdn: / clientport: 52052 vendorcode: 118 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 42.178.166.147 serverIP: 20.138.70.252 userName: -
Explain this syslog message
<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.197.216.32 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.191.35.50 spt=48190 requestMethod=GET app=HTTP requestContext="-" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.191.35.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "FollowUpAction:NONE", "ProxyIP:152.89.196.211", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.197.216.32 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=57.191.35.50 spt=48190 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.191.35.50 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675692257715 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 48190, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "57.191.35.50", "serverIP": "224.197.216.32", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.197.216.32 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.191.35.50 spt=48190 requestMethod=GET app=HTTP requestContext="-" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.191.35.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.197.216.32 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.191.35.50 spt=48190 requestMethod=GET app=HTTP requestContext="-" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.191.35.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1675692257715 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 48190 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 57.191.35.50 serverIP: 224.197.216.32 userName: -
Explain this syslog message
<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=217.174.160.198 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=140.142.166.153 spt=48190 requestMethod=GET app=HTTP requestContext="-" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.142.166.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "FollowUpAction:NONE", "ProxyIP:152.89.196.211", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=217.174.160.198 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=140.142.166.153 spt=48190 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.142.166.153 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675692257715 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 48190, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "140.142.166.153", "serverIP": "217.174.160.198", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=217.174.160.198 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=140.142.166.153 spt=48190 requestMethod=GET app=HTTP requestContext="-" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.142.166.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=217.174.160.198 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=140.142.166.153 spt=48190 requestMethod=GET app=HTTP requestContext="-" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.142.166.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1675692257715 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 48190 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 140.142.166.153 serverIP: 217.174.160.198 userName: -
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=188.213.12.41 dst=94.158.40.187 protocol=tcp sport=52807 dport=443 decision=blocked
{ "action": "block", "clientport": 52807, "message": "<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=188.213.12.41 dst=94.158.40.187 protocol=tcp sport=52807 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "188.213.12.41", "serverIP": "94.158.40.187" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=188.213.12.41 dst=94.158.40.187 protocol=tcp sport=52807 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=188.213.12.41 dst=94.158.40.187 protocol=tcp sport=52807 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52807 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 188.213.12.41 serverIP: 94.158.40.187
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=207.20.180.63 dst=130.0.98.147 protocol=tcp sport=52807 dport=443 decision=blocked
{ "action": "block", "clientport": 52807, "message": "<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=207.20.180.63 dst=130.0.98.147 protocol=tcp sport=52807 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "207.20.180.63", "serverIP": "130.0.98.147" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=207.20.180.63 dst=130.0.98.147 protocol=tcp sport=52807 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=207.20.180.63 dst=130.0.98.147 protocol=tcp sport=52807 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52807 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 207.20.180.63 serverIP: 130.0.98.147
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=193.212.7.95 dst=91.88.52.163 protocol=tcp sport=52807 dport=443 decision=blocked
{ "action": "block", "clientport": 52807, "message": "<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=193.212.7.95 dst=91.88.52.163 protocol=tcp sport=52807 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "193.212.7.95", "serverIP": "91.88.52.163" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=193.212.7.95 dst=91.88.52.163 protocol=tcp sport=52807 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=193.212.7.95 dst=91.88.52.163 protocol=tcp sport=52807 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52807 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 193.212.7.95 serverIP: 91.88.52.163
Explain this syslog message
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=30.183.112.28 dst=242.245.226.25 protocol=tcp sport=52807 dport=443 decision=blocked
{ "action": "block", "clientport": 52807, "message": "<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=30.183.112.28 dst=242.245.226.25 protocol=tcp sport=52807 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "30.183.112.28", "serverIP": "242.245.226.25" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=30.183.112.28 dst=242.245.226.25 protocol=tcp sport=52807 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=30.183.112.28 dst=242.245.226.25 protocol=tcp sport=52807 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 52807 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 30.183.112.28 serverIP: 242.245.226.25
Explain this syslog message
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=124.242.195.130 dst=37.44.137.176 protocol=udp sport=44380 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=124.242.195.130 dst=37.44.137.176 protocol=udp sport=44380 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 44380, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "124.242.195.130", "serverIP": "37.44.137.176" }
Create a JSON artifact from the message
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=124.242.195.130 dst=37.44.137.176 protocol=udp sport=44380 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=124.242.195.130 dst=37.44.137.176 protocol=udp sport=44380 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 44380 protocol: 17 streamName: meraki_l7_firewall clientIP: 124.242.195.130 serverIP: 37.44.137.176
Explain this syslog message
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=173.123.119.130 dst=45.141.131.229 protocol=udp sport=44380 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=173.123.119.130 dst=45.141.131.229 protocol=udp sport=44380 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 44380, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "173.123.119.130", "serverIP": "45.141.131.229" }
Create a JSON artifact from the message
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=173.123.119.130 dst=45.141.131.229 protocol=udp sport=44380 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=173.123.119.130 dst=45.141.131.229 protocol=udp sport=44380 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 44380 protocol: 17 streamName: meraki_l7_firewall clientIP: 173.123.119.130 serverIP: 45.141.131.229
Explain this syslog message
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=110.81.163.243 dst=136.188.252.93 protocol=udp sport=44380 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=110.81.163.243 dst=136.188.252.93 protocol=udp sport=44380 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 44380, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "110.81.163.243", "serverIP": "136.188.252.93" }
Create a JSON artifact from the message
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=110.81.163.243 dst=136.188.252.93 protocol=udp sport=44380 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=110.81.163.243 dst=136.188.252.93 protocol=udp sport=44380 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 44380 protocol: 17 streamName: meraki_l7_firewall clientIP: 110.81.163.243 serverIP: 136.188.252.93
Explain this syslog message
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=251.195.62.21 dst=109.82.95.192 protocol=udp sport=44380 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=251.195.62.21 dst=109.82.95.192 protocol=udp sport=44380 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 44380, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "251.195.62.21", "serverIP": "109.82.95.192" }
Create a JSON artifact from the message
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=251.195.62.21 dst=109.82.95.192 protocol=udp sport=44380 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=251.195.62.21 dst=109.82.95.192 protocol=udp sport=44380 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 44380 protocol: 17 streamName: meraki_l7_firewall clientIP: 251.195.62.21 serverIP: 109.82.95.192
Explain this syslog message
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=146.208.229.83 dst=162.215.200.229 protocol=udp sport=37785 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=146.208.229.83 dst=162.215.200.229 protocol=udp sport=37785 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 37785, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "146.208.229.83", "serverIP": "162.215.200.229" }
Create a JSON artifact from the message
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=146.208.229.83 dst=162.215.200.229 protocol=udp sport=37785 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=146.208.229.83 dst=162.215.200.229 protocol=udp sport=37785 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 37785 protocol: 17 streamName: meraki_l7_firewall clientIP: 146.208.229.83 serverIP: 162.215.200.229
Explain this syslog message
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=232.216.70.171 dst=188.7.53.202 protocol=udp sport=37785 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=232.216.70.171 dst=188.7.53.202 protocol=udp sport=37785 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 37785, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "232.216.70.171", "serverIP": "188.7.53.202" }
Create a JSON artifact from the message
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=232.216.70.171 dst=188.7.53.202 protocol=udp sport=37785 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=232.216.70.171 dst=188.7.53.202 protocol=udp sport=37785 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 37785 protocol: 17 streamName: meraki_l7_firewall clientIP: 232.216.70.171 serverIP: 188.7.53.202
Explain this syslog message
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=190.59.41.19 dst=219.37.49.89 protocol=udp sport=37785 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=190.59.41.19 dst=219.37.49.89 protocol=udp sport=37785 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 37785, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "190.59.41.19", "serverIP": "219.37.49.89" }
Create a JSON artifact from the message
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=190.59.41.19 dst=219.37.49.89 protocol=udp sport=37785 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=190.59.41.19 dst=219.37.49.89 protocol=udp sport=37785 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 37785 protocol: 17 streamName: meraki_l7_firewall clientIP: 190.59.41.19 serverIP: 219.37.49.89
Explain this syslog message
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=76.128.135.26 dst=158.180.254.67 protocol=udp sport=37785 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=76.128.135.26 dst=158.180.254.67 protocol=udp sport=37785 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 37785, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "76.128.135.26", "serverIP": "158.180.254.67" }
Create a JSON artifact from the message
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=76.128.135.26 dst=158.180.254.67 protocol=udp sport=37785 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=76.128.135.26 dst=158.180.254.67 protocol=udp sport=37785 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 37785 protocol: 17 streamName: meraki_l7_firewall clientIP: 76.128.135.26 serverIP: 158.180.254.67
Explain this syslog message
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=62.85.164.109 dst=62.228.158.78 protocol=udp sport=37785 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=62.85.164.109 dst=62.228.158.78 protocol=udp sport=37785 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 37785, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "62.85.164.109", "serverIP": "62.228.158.78" }
Create a JSON artifact from the message
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=62.85.164.109 dst=62.228.158.78 protocol=udp sport=37785 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=62.85.164.109 dst=62.228.158.78 protocol=udp sport=37785 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 37785 protocol: 17 streamName: meraki_l7_firewall clientIP: 62.85.164.109 serverIP: 62.228.158.78
Explain this syslog message
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=92.21.211.115 dst=172.0.234.212 protocol=udp sport=37785 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=92.21.211.115 dst=172.0.234.212 protocol=udp sport=37785 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 37785, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "92.21.211.115", "serverIP": "172.0.234.212" }
Create a JSON artifact from the message
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=92.21.211.115 dst=172.0.234.212 protocol=udp sport=37785 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=92.21.211.115 dst=172.0.234.212 protocol=udp sport=37785 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 37785 protocol: 17 streamName: meraki_l7_firewall clientIP: 92.21.211.115 serverIP: 172.0.234.212
Explain this syslog message
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=224.143.34.216 dst=74.254.102.129 protocol=udp sport=37785 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=224.143.34.216 dst=74.254.102.129 protocol=udp sport=37785 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 37785, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "224.143.34.216", "serverIP": "74.254.102.129" }
Create a JSON artifact from the message
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=224.143.34.216 dst=74.254.102.129 protocol=udp sport=37785 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message