input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=236.2.75.223 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=150.59.94.190 spt=34398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.59.94.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=236.2.75.223 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=150.59.94.190 spt=34398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495378 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1b03-4ba255d3 cn2=34398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.59.94.190 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'SessionID:-', 'FollowUpAction:NONE', 'cef', 'ProxyIP:167.94.145.58']
productids: [0]
sourceinfo: unknown
localstarttime: 1677488495378
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 34398
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 150.59.94.190
serverIP: 236.2.75.223
userName: - | Explain this syslog message |
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.87.201.148 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=177.168.191.225 spt=51980 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication="Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.168.191.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"SessionID:-",
"FollowUpAction:NONE",
"cef",
"ProxyIP:167.94.145.58"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.87.201.148 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=177.168.191.225 spt=51980 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication=\"Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)\" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.168.191.225 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1677488495788 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 51980,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "177.168.191.225",
"serverIP": "34.87.201.148",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.87.201.148 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=177.168.191.225 spt=51980 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication="Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.168.191.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 03:01:35 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=34.87.201.148 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=177.168.191.225 spt=51980 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:35 rt=1677488495788 request=/ requestClientApplication="Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)" dvchost=WAFirewall externalId=186921b1cac-12a103b0 cn2=51980 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.168.191.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'SessionID:-', 'FollowUpAction:NONE', 'cef', 'ProxyIP:167.94.145.58']
productids: [0]
sourceinfo: unknown
localstarttime: 1677488495788
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 51980
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 177.168.191.225
serverIP: 34.87.201.148
userName: - | Explain this syslog message |
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=59.136.19.214 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=39.50.239.193 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=39.50.239.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"cef",
"ProxyIP:167.94.145.58"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=59.136.19.214 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=39.50.239.193 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=39.50.239.193 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1677488496203 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MALFORMED_VERSION",
"severitycode": 9,
"fqdn": "/*",
"clientport": 36598,
"vendorcode": "119",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "39.50.239.193",
"serverIP": "59.136.19.214",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=59.136.19.214 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=39.50.239.193 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=39.50.239.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=59.136.19.214 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=39.50.239.193 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=39.50.239.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'cef', 'ProxyIP:167.94.145.58']
productids: [0]
sourceinfo: unknown
localstarttime: 1677488496203
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MALFORMED_VERSION
severitycode: 9
fqdn: /*
clientport: 36598
vendorcode: 119
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 39.50.239.193
serverIP: 59.136.19.214
userName: - | Explain this syslog message |
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=61.207.237.163 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=158.23.83.233 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.23.83.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"cef",
"ProxyIP:167.94.145.58"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=61.207.237.163 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=158.23.83.233 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.23.83.233 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1677488496203 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MALFORMED_VERSION",
"severitycode": 9,
"fqdn": "/*",
"clientport": 36598,
"vendorcode": "119",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "158.23.83.233",
"serverIP": "61.207.237.163",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=61.207.237.163 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=158.23.83.233 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.23.83.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=61.207.237.163 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=158.23.83.233 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=158.23.83.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'cef', 'ProxyIP:167.94.145.58']
productids: [0]
sourceinfo: unknown
localstarttime: 1677488496203
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MALFORMED_VERSION
severitycode: 9
fqdn: /*
clientport: 36598
vendorcode: 119
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 158.23.83.233
serverIP: 61.207.237.163
userName: - | Explain this syslog message |
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=20.233.157.127 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=44.229.135.0 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.229.135.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:134.209.88.168",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=20.233.157.127 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=44.229.135.0 spt=50332 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.229.135.0 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1677488473271 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/favicon.ico",
"clientport": 50332,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "44.229.135.0",
"serverIP": "20.233.157.127",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=20.233.157.127 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=44.229.135.0 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.229.135.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=20.233.157.127 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=44.229.135.0 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.229.135.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1677488473271
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /favicon.ico
clientport: 50332
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 44.229.135.0
serverIP: 20.233.157.127
userName: - | Explain this syslog message |
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=68.121.91.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=162.23.235.100 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=162.23.235.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:134.209.88.168",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=68.121.91.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=162.23.235.100 spt=50332 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=162.23.235.100 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1677488473271 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/favicon.ico",
"clientport": 50332,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "162.23.235.100",
"serverIP": "68.121.91.3",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=68.121.91.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=162.23.235.100 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=162.23.235.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=68.121.91.3 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=162.23.235.100 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=162.23.235.100 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1677488473271
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /favicon.ico
clientport: 50332
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 162.23.235.100
serverIP: 68.121.91.3
userName: - | Explain this syslog message |
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.24.200.143 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.209.90.238 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.209.90.238 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:134.209.88.168",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.24.200.143 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=118.209.90.238 spt=50332 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.209.90.238 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1677488473271 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/favicon.ico",
"clientport": 50332,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "118.209.90.238",
"serverIP": "150.24.200.143",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.24.200.143 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.209.90.238 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.209.90.238 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 03:01:13 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=150.24.200.143 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.209.90.238 spt=50332 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:13 rt=1677488473271 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac4b7-4ac5851b cn2=50332 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.209.90.238 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1677488473271
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /favicon.ico
clientport: 50332
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 118.209.90.238
serverIP: 150.24.200.143
userName: - | Explain this syslog message |
<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.197.15.63 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.83.147.153 spt=50342 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.83.147.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:134.209.88.168",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.197.15.63 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=183.83.147.153 spt=50342 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.83.147.153 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1677488474379 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 50342,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "183.83.147.153",
"serverIP": "14.197.15.63",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.197.15.63 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.83.147.153 spt=50342 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.83.147.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=14.197.15.63 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.83.147.153 spt=50342 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.83.147.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1677488474379
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 50342
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 183.83.147.153
serverIP: 14.197.15.63
userName: - | Explain this syslog message |
<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=57.134.187.19 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=94.22.66.240 spt=50342 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.22.66.240 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:134.209.88.168",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=57.134.187.19 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=94.22.66.240 spt=50342 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.22.66.240 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1677488474379 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 50342,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "94.22.66.240",
"serverIP": "57.134.187.19",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=57.134.187.19 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=94.22.66.240 spt=50342 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.22.66.240 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 03:01:14 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=57.134.187.19 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=94.22.66.240 spt=50342 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:14 rt=1677488474379 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac90b-50c9c531 cn2=50342 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=94.22.66.240 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1677488474379
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 50342
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 94.22.66.240
serverIP: 57.134.187.19
userName: - | Explain this syslog message |
<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.57.65.200 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=87.58.248.141 spt=50328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.58.248.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:134.209.88.168",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.57.65.200 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=87.58.248.141 spt=50328 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.58.248.141 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1677488472913 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 50328,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "87.58.248.141",
"serverIP": "87.57.65.200",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.57.65.200 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=87.58.248.141 spt=50328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.58.248.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.57.65.200 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=87.58.248.141 spt=50328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.58.248.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1677488472913
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 50328
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 87.58.248.141
serverIP: 87.57.65.200
userName: - | Explain this syslog message |
<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=81.190.7.165 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=150.102.111.113 spt=50328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.102.111.113 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:134.209.88.168",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=81.190.7.165 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=150.102.111.113 spt=50328 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36\" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.102.111.113 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1677488472913 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 50328,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "150.102.111.113",
"serverIP": "81.190.7.165",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=81.190.7.165 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=150.102.111.113 spt=50328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.102.111.113 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 03:01:12 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=81.190.7.165 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=150.102.111.113 spt=50328 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:12 rt=1677488472913 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36" dvchost=WAFirewall externalId=186921ac331-4fcbb05a cn2=50328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=150.102.111.113 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:134.209.88.168', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1677488472913
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 50328
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 150.102.111.113
serverIP: 81.190.7.165
userName: - | Explain this syslog message |
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=143.138.139.63 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=99.206.212.123 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=99.206.212.123 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"cef",
"ProxyIP:167.94.145.58"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=143.138.139.63 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser=\"-\" src=99.206.212.123 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext=\"-\" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=99.206.212.123 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1677488496203 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "MALFORMED_VERSION",
"severitycode": 9,
"fqdn": "/*",
"clientport": 36598,
"vendorcode": "119",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "99.206.212.123",
"serverIP": "143.138.139.63",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=143.138.139.63 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=99.206.212.123 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=99.206.212.123 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 27 03:01:36 WAFirewall CEF:0|Barracuda|WAF|1200|119|MALFORMED_VERSION|1|cat=WF dst=143.138.139.63 dpt=443 act=DENY msg=[PRI * HTTP/2.0] duser="-" src=99.206.212.123 spt=36598 requestMethod=PRI app=TLSv1.3 requestContext="-" start=Feb 27 2023 03:01:36 rt=1677488496203 request=/* requestClientApplication="Unknown" dvchost=WAFirewall externalId=186921b1e4b-4f997d8a cn2=36598 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=99.206.212.123 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'cef', 'ProxyIP:167.94.145.58']
productids: [0]
sourceinfo: unknown
localstarttime: 1677488496203
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: MALFORMED_VERSION
severitycode: 9
fqdn: /*
clientport: 36598
vendorcode: 119
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 99.206.212.123
serverIP: 143.138.139.63
userName: - | Explain this syslog message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=161.80.170.158 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.70.205.196 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.70.205.196 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:77.91.78.56",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=161.80.170.158 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=239.70.205.196 spt=52054 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication=\"Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0\" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.70.205.196 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1676429214485 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php",
"clientport": 52054,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "239.70.205.196",
"serverIP": "161.80.170.158",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=161.80.170.158 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.70.205.196 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.70.205.196 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=161.80.170.158 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.70.205.196 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.70.205.196 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:77.91.78.56', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1676429214485
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
clientport: 52054
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 239.70.205.196
serverIP: 161.80.170.158
userName: - | Explain this syslog message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=106.51.246.25 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=71.5.175.15 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.5.175.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:77.91.78.56",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=106.51.246.25 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=71.5.175.15 spt=52054 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication=\"Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0\" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.5.175.15 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1676429214485 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php",
"clientport": 52054,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "71.5.175.15",
"serverIP": "106.51.246.25",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=106.51.246.25 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=71.5.175.15 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.5.175.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=106.51.246.25 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=71.5.175.15 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=71.5.175.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:77.91.78.56', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1676429214485
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
clientport: 52054
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 71.5.175.15
serverIP: 106.51.246.25
userName: - | Explain this syslog message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=152.6.144.132 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=25.244.95.80 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.244.95.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:77.91.78.56",
"RuleID:global"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=152.6.144.132 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=25.244.95.80 spt=52054 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication=\"Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0\" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.244.95.80 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1676429214485 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php",
"clientport": 52054,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "25.244.95.80",
"serverIP": "152.6.144.132",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=152.6.144.132 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=25.244.95.80 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.244.95.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=152.6.144.132 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=25.244.95.80 spt=52054 requestMethod=GET app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214485 request=/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php requestClientApplication="Mozilla/5.0 (X11; Linux i686; rv:40.0) Gecko/20100101 Firefox/40.0" dvchost=WAFirewall externalId=18652f7c315-e76caaf1 cn2=52054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.244.95.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:77.91.78.56', 'RuleID:global']
productids: [0]
sourceinfo: unknown
localstarttime: 1676429214485
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
clientport: 52054
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 25.244.95.80
serverIP: 152.6.144.132
userName: - | Explain this syslog message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=200.74.0.47 dpt=80 act=DENY msg=[] duser="-" src=152.212.13.156 spt=52052 requestMethod="-" app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.212.13.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"ProxyIP:77.91.78.56",
"RuleID:global",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=200.74.0.47 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=152.212.13.156 spt=52052 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.212.13.156 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1676429214217 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 52052,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "152.212.13.156",
"serverIP": "200.74.0.47",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=200.74.0.47 dpt=80 act=DENY msg=[] duser="-" src=152.212.13.156 spt=52052 requestMethod="-" app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.212.13.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=200.74.0.47 dpt=80 act=DENY msg=[] duser="-" src=152.212.13.156 spt=52052 requestMethod="-" app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=152.212.13.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'ProxyIP:77.91.78.56', 'RuleID:global', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1676429214217
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 52052
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 152.212.13.156
serverIP: 200.74.0.47
userName: - | Explain this syslog message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=20.138.70.252 dpt=80 act=DENY msg=[] duser="-" src=42.178.166.147 spt=52052 requestMethod="-" app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=42.178.166.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"barracuda_waf_INVALID_METHOD",
"ProxyIP:77.91.78.56",
"RuleID:global",
"AttackGroup:Protocol Violations",
"INVALID_METHOD"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=20.138.70.252 dpt=80 act=DENY msg=[\u0016\u0003\u0001] duser=\"-\" src=42.178.166.147 spt=52052 requestMethod=\"-\" app=HTTP requestContext=\"-\" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=42.178.166.147 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1676429214217 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "INVALID_METHOD",
"severitycode": 9,
"fqdn": "/",
"clientport": 52052,
"vendorcode": "118",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "42.178.166.147",
"serverIP": "20.138.70.252",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=20.138.70.252 dpt=80 act=DENY msg=[] duser="-" src=42.178.166.147 spt=52052 requestMethod="-" app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=42.178.166.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 14 20:46:54 WAFirewall CEF:0|Barracuda|WAF|1200|118|INVALID_METHOD|1|cat=WF dst=20.138.70.252 dpt=80 act=DENY msg=[] duser="-" src=42.178.166.147 spt=52052 requestMethod="-" app=HTTP requestContext="-" start=Feb 14 2023 20:46:54 rt=1676429214217 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18652f7c209-ea6ac4e2 cn2=52052 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=42.178.166.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'ProxyIP:77.91.78.56', 'RuleID:global', 'AttackGroup:Protocol Violations', 'INVALID_METHOD']
productids: [0]
sourceinfo: unknown
localstarttime: 1676429214217
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: INVALID_METHOD
severitycode: 9
fqdn: /
clientport: 52052
vendorcode: 118
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 42.178.166.147
serverIP: 20.138.70.252
userName: - | Explain this syslog message |
<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.197.216.32 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.191.35.50 spt=48190 requestMethod=GET app=HTTP requestContext="-" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.191.35.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.197.216.32 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=57.191.35.50 spt=48190 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.191.35.50 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675692257715 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 48190,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "57.191.35.50",
"serverIP": "224.197.216.32",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.197.216.32 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.191.35.50 spt=48190 requestMethod=GET app=HTTP requestContext="-" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.191.35.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=224.197.216.32 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.191.35.50 spt=48190 requestMethod=GET app=HTTP requestContext="-" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.191.35.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1675692257715
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 48190
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 57.191.35.50
serverIP: 224.197.216.32
userName: - | Explain this syslog message |
<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=217.174.160.198 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=140.142.166.153 spt=48190 requestMethod=GET app=HTTP requestContext="-" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.142.166.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=217.174.160.198 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=140.142.166.153 spt=48190 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.142.166.153 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675692257715 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 48190,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "140.142.166.153",
"serverIP": "217.174.160.198",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=217.174.160.198 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=140.142.166.153 spt=48190 requestMethod=GET app=HTTP requestContext="-" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.142.166.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 08:04:17 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=217.174.160.198 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=140.142.166.153 spt=48190 requestMethod=GET app=HTTP requestContext="-" start=Feb 06 2023 08:04:17 rt=1675692257715 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186270ab1b2-bd16983 cn2=48190 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.142.166.153 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1675692257715
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 48190
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 140.142.166.153
serverIP: 217.174.160.198
userName: - | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=188.213.12.41 dst=94.158.40.187 protocol=tcp sport=52807 dport=443 decision=blocked | {
"action": "block",
"clientport": 52807,
"message": "<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=188.213.12.41 dst=94.158.40.187 protocol=tcp sport=52807 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "188.213.12.41",
"serverIP": "94.158.40.187"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=188.213.12.41 dst=94.158.40.187 protocol=tcp sport=52807 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=188.213.12.41 dst=94.158.40.187 protocol=tcp sport=52807 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52807
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 188.213.12.41
serverIP: 94.158.40.187 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=207.20.180.63 dst=130.0.98.147 protocol=tcp sport=52807 dport=443 decision=blocked | {
"action": "block",
"clientport": 52807,
"message": "<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=207.20.180.63 dst=130.0.98.147 protocol=tcp sport=52807 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "207.20.180.63",
"serverIP": "130.0.98.147"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=207.20.180.63 dst=130.0.98.147 protocol=tcp sport=52807 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=207.20.180.63 dst=130.0.98.147 protocol=tcp sport=52807 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52807
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 207.20.180.63
serverIP: 130.0.98.147 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=193.212.7.95 dst=91.88.52.163 protocol=tcp sport=52807 dport=443 decision=blocked | {
"action": "block",
"clientport": 52807,
"message": "<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=193.212.7.95 dst=91.88.52.163 protocol=tcp sport=52807 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "193.212.7.95",
"serverIP": "91.88.52.163"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=193.212.7.95 dst=91.88.52.163 protocol=tcp sport=52807 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=193.212.7.95 dst=91.88.52.163 protocol=tcp sport=52807 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52807
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 193.212.7.95
serverIP: 91.88.52.163 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=30.183.112.28 dst=242.245.226.25 protocol=tcp sport=52807 dport=443 decision=blocked | {
"action": "block",
"clientport": 52807,
"message": "<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=30.183.112.28 dst=242.245.226.25 protocol=tcp sport=52807 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "30.183.112.28",
"serverIP": "242.245.226.25"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=30.183.112.28 dst=242.245.226.25 protocol=tcp sport=52807 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1687539321.529518190 NORDC_MX400_1 l7_firewall src=30.183.112.28 dst=242.245.226.25 protocol=tcp sport=52807 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 52807
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 30.183.112.28
serverIP: 242.245.226.25 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=124.242.195.130 dst=37.44.137.176 protocol=udp sport=44380 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=124.242.195.130 dst=37.44.137.176 protocol=udp sport=44380 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 44380,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "124.242.195.130",
"serverIP": "37.44.137.176"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=124.242.195.130 dst=37.44.137.176 protocol=udp sport=44380 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=124.242.195.130 dst=37.44.137.176 protocol=udp sport=44380 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 44380
protocol: 17
streamName: meraki_l7_firewall
clientIP: 124.242.195.130
serverIP: 37.44.137.176 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=173.123.119.130 dst=45.141.131.229 protocol=udp sport=44380 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=173.123.119.130 dst=45.141.131.229 protocol=udp sport=44380 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 44380,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "173.123.119.130",
"serverIP": "45.141.131.229"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=173.123.119.130 dst=45.141.131.229 protocol=udp sport=44380 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=173.123.119.130 dst=45.141.131.229 protocol=udp sport=44380 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 44380
protocol: 17
streamName: meraki_l7_firewall
clientIP: 173.123.119.130
serverIP: 45.141.131.229 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=110.81.163.243 dst=136.188.252.93 protocol=udp sport=44380 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=110.81.163.243 dst=136.188.252.93 protocol=udp sport=44380 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 44380,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "110.81.163.243",
"serverIP": "136.188.252.93"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=110.81.163.243 dst=136.188.252.93 protocol=udp sport=44380 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=110.81.163.243 dst=136.188.252.93 protocol=udp sport=44380 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 44380
protocol: 17
streamName: meraki_l7_firewall
clientIP: 110.81.163.243
serverIP: 136.188.252.93 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=251.195.62.21 dst=109.82.95.192 protocol=udp sport=44380 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=251.195.62.21 dst=109.82.95.192 protocol=udp sport=44380 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 44380,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "251.195.62.21",
"serverIP": "109.82.95.192"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=251.195.62.21 dst=109.82.95.192 protocol=udp sport=44380 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1657568326.084343037 M55_MX67C_Hattiesburg l7_firewall src=251.195.62.21 dst=109.82.95.192 protocol=udp sport=44380 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 44380
protocol: 17
streamName: meraki_l7_firewall
clientIP: 251.195.62.21
serverIP: 109.82.95.192 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=146.208.229.83 dst=162.215.200.229 protocol=udp sport=37785 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=146.208.229.83 dst=162.215.200.229 protocol=udp sport=37785 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37785,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "146.208.229.83",
"serverIP": "162.215.200.229"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=146.208.229.83 dst=162.215.200.229 protocol=udp sport=37785 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=146.208.229.83 dst=162.215.200.229 protocol=udp sport=37785 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37785
protocol: 17
streamName: meraki_l7_firewall
clientIP: 146.208.229.83
serverIP: 162.215.200.229 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=232.216.70.171 dst=188.7.53.202 protocol=udp sport=37785 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=232.216.70.171 dst=188.7.53.202 protocol=udp sport=37785 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37785,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "232.216.70.171",
"serverIP": "188.7.53.202"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=232.216.70.171 dst=188.7.53.202 protocol=udp sport=37785 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=232.216.70.171 dst=188.7.53.202 protocol=udp sport=37785 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37785
protocol: 17
streamName: meraki_l7_firewall
clientIP: 232.216.70.171
serverIP: 188.7.53.202 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=190.59.41.19 dst=219.37.49.89 protocol=udp sport=37785 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=190.59.41.19 dst=219.37.49.89 protocol=udp sport=37785 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37785,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "190.59.41.19",
"serverIP": "219.37.49.89"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=190.59.41.19 dst=219.37.49.89 protocol=udp sport=37785 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=190.59.41.19 dst=219.37.49.89 protocol=udp sport=37785 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37785
protocol: 17
streamName: meraki_l7_firewall
clientIP: 190.59.41.19
serverIP: 219.37.49.89 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=76.128.135.26 dst=158.180.254.67 protocol=udp sport=37785 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=76.128.135.26 dst=158.180.254.67 protocol=udp sport=37785 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37785,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "76.128.135.26",
"serverIP": "158.180.254.67"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=76.128.135.26 dst=158.180.254.67 protocol=udp sport=37785 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1657568322.023586837 M55_MX67C_Hattiesburg l7_firewall src=76.128.135.26 dst=158.180.254.67 protocol=udp sport=37785 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37785
protocol: 17
streamName: meraki_l7_firewall
clientIP: 76.128.135.26
serverIP: 158.180.254.67 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=62.85.164.109 dst=62.228.158.78 protocol=udp sport=37785 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=62.85.164.109 dst=62.228.158.78 protocol=udp sport=37785 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37785,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "62.85.164.109",
"serverIP": "62.228.158.78"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=62.85.164.109 dst=62.228.158.78 protocol=udp sport=37785 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=62.85.164.109 dst=62.228.158.78 protocol=udp sport=37785 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37785
protocol: 17
streamName: meraki_l7_firewall
clientIP: 62.85.164.109
serverIP: 62.228.158.78 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=92.21.211.115 dst=172.0.234.212 protocol=udp sport=37785 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=92.21.211.115 dst=172.0.234.212 protocol=udp sport=37785 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37785,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "92.21.211.115",
"serverIP": "172.0.234.212"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=92.21.211.115 dst=172.0.234.212 protocol=udp sport=37785 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=92.21.211.115 dst=172.0.234.212 protocol=udp sport=37785 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37785
protocol: 17
streamName: meraki_l7_firewall
clientIP: 92.21.211.115
serverIP: 172.0.234.212 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=224.143.34.216 dst=74.254.102.129 protocol=udp sport=37785 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=224.143.34.216 dst=74.254.102.129 protocol=udp sport=37785 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37785,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "224.143.34.216",
"serverIP": "74.254.102.129"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1657568322.023819517 M55_MX67C_Hattiesburg l7_firewall src=224.143.34.216 dst=74.254.102.129 protocol=udp sport=37785 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.