input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<172>Mar 27 2023 15:31:13 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:109.222.0.2/51307 dst outside:87.192.160.255/7680 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 7680 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 51307 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 109.222.0.2 serverIP: 87.192.160.255
Explain this syslog message
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=255.168.21.238 dpt=443 act=DENY msg=["-"] duser="-" src=242.84.116.186 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.84.116.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:34.245.128.35", "barracuda_waf", "cef", "FollowUpAction:NONE", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=255.168.21.238 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=242.84.116.186 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication=\"Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)\" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.84.116.186 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1662357081833 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "SLASH_DOT_IN_URL", "severitycode": 9, "fqdn": "//config/.env", "clientport": 46168, "vendorcode": "14", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "242.84.116.186", "serverIP": "255.168.21.238", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=255.168.21.238 dpt=443 act=DENY msg=["-"] duser="-" src=242.84.116.186 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.84.116.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=255.168.21.238 dpt=443 act=DENY msg=["-"] duser="-" src=242.84.116.186 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.84.116.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:34.245.128.35', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1662357081833 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: SLASH_DOT_IN_URL severitycode: 9 fqdn: //config/.env clientport: 46168 vendorcode: 14 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 242.84.116.186 serverIP: 255.168.21.238 userName: -
Explain this syslog message
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=7.222.200.214 dpt=443 act=DENY msg=["-"] duser="-" src=177.180.187.192 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.180.187.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:34.245.128.35", "barracuda_waf", "cef", "FollowUpAction:NONE", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=7.222.200.214 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=177.180.187.192 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication=\"Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)\" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.180.187.192 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1662357081472 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "SLASH_DOT_IN_URL", "severitycode": 9, "fqdn": "//database/.env", "clientport": 46154, "vendorcode": "14", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "177.180.187.192", "serverIP": "7.222.200.214", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=7.222.200.214 dpt=443 act=DENY msg=["-"] duser="-" src=177.180.187.192 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.180.187.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=7.222.200.214 dpt=443 act=DENY msg=["-"] duser="-" src=177.180.187.192 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.180.187.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:34.245.128.35', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1662357081472 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: SLASH_DOT_IN_URL severitycode: 9 fqdn: //database/.env clientport: 46154 vendorcode: 14 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 177.180.187.192 serverIP: 7.222.200.214 userName: -
Explain this syslog message
<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=142.124.218.95 dpt=443 act=DENY msg=["-"] duser="-" src=231.76.209.164 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.76.209.164 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:34.245.128.35", "barracuda_waf", "cef", "FollowUpAction:NONE", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=142.124.218.95 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=231.76.209.164 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication=\"Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)\" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.76.209.164 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1662357087322 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "SLASH_DOT_IN_URL", "severitycode": 9, "fqdn": "//tools/.env", "clientport": 37906, "vendorcode": "14", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "231.76.209.164", "serverIP": "142.124.218.95", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=142.124.218.95 dpt=443 act=DENY msg=["-"] duser="-" src=231.76.209.164 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.76.209.164 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=142.124.218.95 dpt=443 act=DENY msg=["-"] duser="-" src=231.76.209.164 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.76.209.164 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:34.245.128.35', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1662357087322 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: SLASH_DOT_IN_URL severitycode: 9 fqdn: //tools/.env clientport: 37906 vendorcode: 14 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 231.76.209.164 serverIP: 142.124.218.95 userName: -
Explain this syslog message
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=40.244.52.34 dpt=443 act=DENY msg=["-"] duser="-" src=130.179.15.3 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.179.15.3 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:34.245.128.35", "barracuda_waf", "cef", "FollowUpAction:NONE", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=40.244.52.34 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=130.179.15.3 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication=\"Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)\" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.179.15.3 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1662357081833 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "SLASH_DOT_IN_URL", "severitycode": 9, "fqdn": "//config/.env", "clientport": 46168, "vendorcode": "14", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "130.179.15.3", "serverIP": "40.244.52.34", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=40.244.52.34 dpt=443 act=DENY msg=["-"] duser="-" src=130.179.15.3 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.179.15.3 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=40.244.52.34 dpt=443 act=DENY msg=["-"] duser="-" src=130.179.15.3 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.179.15.3 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:34.245.128.35', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1662357081833 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: SLASH_DOT_IN_URL severitycode: 9 fqdn: //config/.env clientport: 46168 vendorcode: 14 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 130.179.15.3 serverIP: 40.244.52.34 userName: -
Explain this syslog message
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=147.74.233.22 dpt=443 act=DENY msg=["-"] duser="-" src=210.26.253.40 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=210.26.253.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:34.245.128.35", "barracuda_waf", "cef", "FollowUpAction:NONE", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=147.74.233.22 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=210.26.253.40 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication=\"Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)\" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=210.26.253.40 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1662357081472 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "SLASH_DOT_IN_URL", "severitycode": 9, "fqdn": "//database/.env", "clientport": 46154, "vendorcode": "14", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "210.26.253.40", "serverIP": "147.74.233.22", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=147.74.233.22 dpt=443 act=DENY msg=["-"] duser="-" src=210.26.253.40 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=210.26.253.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=147.74.233.22 dpt=443 act=DENY msg=["-"] duser="-" src=210.26.253.40 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=210.26.253.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:34.245.128.35', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1662357081472 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: SLASH_DOT_IN_URL severitycode: 9 fqdn: //database/.env clientport: 46154 vendorcode: 14 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 210.26.253.40 serverIP: 147.74.233.22 userName: -
Explain this syslog message
<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=179.107.113.75 dpt=443 act=DENY msg=["-"] duser="-" src=103.93.156.235 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=103.93.156.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_SLASH_DOT_IN_URL", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:34.245.128.35", "barracuda_waf", "cef", "FollowUpAction:NONE", "rfc3164", "SLASH_DOT_IN_URL", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=179.107.113.75 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=103.93.156.235 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication=\"Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)\" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=103.93.156.235 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1662357087322 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "SLASH_DOT_IN_URL", "severitycode": 9, "fqdn": "//tools/.env", "clientport": 37906, "vendorcode": "14", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "103.93.156.235", "serverIP": "179.107.113.75", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=179.107.113.75 dpt=443 act=DENY msg=["-"] duser="-" src=103.93.156.235 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=103.93.156.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=179.107.113.75 dpt=443 act=DENY msg=["-"] duser="-" src=103.93.156.235 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=103.93.156.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:34.245.128.35', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1662357087322 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: SLASH_DOT_IN_URL severitycode: 9 fqdn: //tools/.env clientport: 37906 vendorcode: 14 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 103.93.156.235 serverIP: 179.107.113.75 userName: -
Explain this syslog message
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=39.94.0.154 dst=85.79.57.168 protocol=udp sport=50021 dport=39401 decision=blocked
{ "action": "block", "clientport": 50021, "message": "<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=39.94.0.154 dst=85.79.57.168 protocol=udp sport=50021 dport=39401 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 39401, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "39.94.0.154", "serverIP": "85.79.57.168" }
Create a JSON artifact from the message
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=39.94.0.154 dst=85.79.57.168 protocol=udp sport=50021 dport=39401 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=39.94.0.154 dst=85.79.57.168 protocol=udp sport=50021 dport=39401 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 50021 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 39401 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 39.94.0.154 serverIP: 85.79.57.168
Explain this syslog message
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=143.39.67.30 dst=25.60.100.249 protocol=udp sport=50021 dport=39401 decision=blocked
{ "action": "block", "clientport": 50021, "message": "<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=143.39.67.30 dst=25.60.100.249 protocol=udp sport=50021 dport=39401 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 39401, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "143.39.67.30", "serverIP": "25.60.100.249" }
Create a JSON artifact from the message
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=143.39.67.30 dst=25.60.100.249 protocol=udp sport=50021 dport=39401 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=143.39.67.30 dst=25.60.100.249 protocol=udp sport=50021 dport=39401 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 50021 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 39401 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 143.39.67.30 serverIP: 25.60.100.249
Explain this syslog message
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=171.202.136.133 dst=196.226.29.6 protocol=udp sport=50021 dport=39401 decision=blocked
{ "action": "block", "clientport": 50021, "message": "<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=171.202.136.133 dst=196.226.29.6 protocol=udp sport=50021 dport=39401 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 39401, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "171.202.136.133", "serverIP": "196.226.29.6" }
Create a JSON artifact from the message
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=171.202.136.133 dst=196.226.29.6 protocol=udp sport=50021 dport=39401 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=171.202.136.133 dst=196.226.29.6 protocol=udp sport=50021 dport=39401 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 50021 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 39401 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 171.202.136.133 serverIP: 196.226.29.6
Explain this syslog message
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=241.114.118.243 dst=208.233.220.39 protocol=udp sport=50021 dport=39401 decision=blocked
{ "action": "block", "clientport": 50021, "message": "<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=241.114.118.243 dst=208.233.220.39 protocol=udp sport=50021 dport=39401 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 39401, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "241.114.118.243", "serverIP": "208.233.220.39" }
Create a JSON artifact from the message
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=241.114.118.243 dst=208.233.220.39 protocol=udp sport=50021 dport=39401 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=241.114.118.243 dst=208.233.220.39 protocol=udp sport=50021 dport=39401 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 50021 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 39401 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 241.114.118.243 serverIP: 208.233.220.39
Explain this syslog message
<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.127.70.243 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=246.118.42.203 spt=36328 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=246.118.42.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:179.43.177.242", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.127.70.243 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=246.118.42.203 spt=36328 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication=\"Hello World\" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=246.118.42.203 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675825650292 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 36328, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "246.118.42.203", "serverIP": "155.127.70.243", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.127.70.243 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=246.118.42.203 spt=36328 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=246.118.42.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.127.70.243 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=246.118.42.203 spt=36328 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=246.118.42.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:179.43.177.242', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675825650292 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 36328 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 246.118.42.203 serverIP: 155.127.70.243 userName: -
Explain this syslog message
<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=93.238.211.225 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.218.140.241 spt=36328 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.218.140.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "ProxyIP:179.43.177.242", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=93.238.211.225 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=216.218.140.241 spt=36328 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication=\"Hello World\" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.218.140.241 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675825650292 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 36328, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "216.218.140.241", "serverIP": "93.238.211.225", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=93.238.211.225 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.218.140.241 spt=36328 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.218.140.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=93.238.211.225 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.218.140.241 spt=36328 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.218.140.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:179.43.177.242', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675825650292 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 36328 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 216.218.140.241 serverIP: 93.238.211.225 userName: -
Explain this syslog message
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=70.147.63.229 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.60.89.221 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.60.89.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:193.106.29.122", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=70.147.63.229 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=118.60.89.221 spt=64566 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication=\"Mozilla/5.0\" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.60.89.221 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675398034393 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 64566, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "118.60.89.221", "serverIP": "70.147.63.229", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=70.147.63.229 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.60.89.221 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.60.89.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=70.147.63.229 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.60.89.221 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.60.89.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:193.106.29.122', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675398034393 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 64566 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 118.60.89.221 serverIP: 70.147.63.229 userName: -
Explain this syslog message
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=250.149.150.89 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.242.118.35 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.242.118.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:193.106.29.122", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=250.149.150.89 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=21.242.118.35 spt=64566 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication=\"Mozilla/5.0\" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.242.118.35 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675398034393 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 64566, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "21.242.118.35", "serverIP": "250.149.150.89", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=250.149.150.89 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.242.118.35 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.242.118.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=250.149.150.89 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.242.118.35 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.242.118.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:193.106.29.122', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675398034393 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 64566 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 21.242.118.35 serverIP: 250.149.150.89 userName: -
Explain this syslog message
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.200.200.157 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=190.249.2.9 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=190.249.2.9 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:193.106.29.122", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.200.200.157 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=190.249.2.9 spt=64566 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication=\"Mozilla/5.0\" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=190.249.2.9 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675398034393 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 64566, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "190.249.2.9", "serverIP": "115.200.200.157", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.200.200.157 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=190.249.2.9 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=190.249.2.9 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.200.200.157 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=190.249.2.9 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=190.249.2.9 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:193.106.29.122', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675398034393 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 64566 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 190.249.2.9 serverIP: 115.200.200.157 userName: -
Explain this syslog message
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=65.228.169.116 dst=63.244.35.122 protocol=tcp sport=56515 dport=443 decision=blocked
{ "action": "block", "clientport": 56515, "message": "<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=65.228.169.116 dst=63.244.35.122 protocol=tcp sport=56515 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "65.228.169.116", "serverIP": "63.244.35.122" }
Create a JSON artifact from the message
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=65.228.169.116 dst=63.244.35.122 protocol=tcp sport=56515 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=65.228.169.116 dst=63.244.35.122 protocol=tcp sport=56515 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 56515 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 65.228.169.116 serverIP: 63.244.35.122
Explain this syslog message
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=172.40.62.162 dst=21.57.146.171 protocol=tcp sport=56515 dport=443 decision=blocked
{ "action": "block", "clientport": 56515, "message": "<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=172.40.62.162 dst=21.57.146.171 protocol=tcp sport=56515 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "172.40.62.162", "serverIP": "21.57.146.171" }
Create a JSON artifact from the message
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=172.40.62.162 dst=21.57.146.171 protocol=tcp sport=56515 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=172.40.62.162 dst=21.57.146.171 protocol=tcp sport=56515 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 56515 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 172.40.62.162 serverIP: 21.57.146.171
Explain this syslog message
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=225.80.13.223 dst=125.220.170.220 protocol=tcp sport=56515 dport=443 decision=blocked
{ "action": "block", "clientport": 56515, "message": "<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=225.80.13.223 dst=125.220.170.220 protocol=tcp sport=56515 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "225.80.13.223", "serverIP": "125.220.170.220" }
Create a JSON artifact from the message
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=225.80.13.223 dst=125.220.170.220 protocol=tcp sport=56515 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=225.80.13.223 dst=125.220.170.220 protocol=tcp sport=56515 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 56515 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 225.80.13.223 serverIP: 125.220.170.220
Explain this syslog message
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=187.142.142.38 dst=8.130.3.122 protocol=tcp sport=56515 dport=443 decision=blocked
{ "action": "block", "clientport": 56515, "message": "<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=187.142.142.38 dst=8.130.3.122 protocol=tcp sport=56515 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "187.142.142.38", "serverIP": "8.130.3.122" }
Create a JSON artifact from the message
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=187.142.142.38 dst=8.130.3.122 protocol=tcp sport=56515 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=187.142.142.38 dst=8.130.3.122 protocol=tcp sport=56515 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 56515 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 187.142.142.38 serverIP: 8.130.3.122
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=201.167.40.190 dst=67.102.207.87 protocol=tcp sport=443 dport=37682 decision=blocked
{ "action": "block", "clientport": 37682, "message": "<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=201.167.40.190 dst=67.102.207.87 protocol=tcp sport=443 dport=37682 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "67.102.207.87", "serverIP": "201.167.40.190" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=201.167.40.190 dst=67.102.207.87 protocol=tcp sport=443 dport=37682 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=201.167.40.190 dst=67.102.207.87 protocol=tcp sport=443 dport=37682 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 37682 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 67.102.207.87 serverIP: 201.167.40.190
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=85.132.232.200 dst=99.228.29.181 protocol=tcp sport=443 dport=37682 decision=blocked
{ "action": "block", "clientport": 37682, "message": "<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=85.132.232.200 dst=99.228.29.181 protocol=tcp sport=443 dport=37682 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "99.228.29.181", "serverIP": "85.132.232.200" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=85.132.232.200 dst=99.228.29.181 protocol=tcp sport=443 dport=37682 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=85.132.232.200 dst=99.228.29.181 protocol=tcp sport=443 dport=37682 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 37682 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 99.228.29.181 serverIP: 85.132.232.200
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=192.54.18.242 dst=144.123.222.230 protocol=tcp sport=443 dport=37682 decision=blocked
{ "action": "block", "clientport": 37682, "message": "<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=192.54.18.242 dst=144.123.222.230 protocol=tcp sport=443 dport=37682 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "144.123.222.230", "serverIP": "192.54.18.242" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=192.54.18.242 dst=144.123.222.230 protocol=tcp sport=443 dport=37682 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=192.54.18.242 dst=144.123.222.230 protocol=tcp sport=443 dport=37682 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 37682 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 144.123.222.230 serverIP: 192.54.18.242
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=231.136.79.99 dst=92.86.167.42 protocol=tcp sport=443 dport=37682 decision=blocked
{ "action": "block", "clientport": 37682, "message": "<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=231.136.79.99 dst=92.86.167.42 protocol=tcp sport=443 dport=37682 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "92.86.167.42", "serverIP": "231.136.79.99" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=231.136.79.99 dst=92.86.167.42 protocol=tcp sport=443 dport=37682 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=231.136.79.99 dst=92.86.167.42 protocol=tcp sport=443 dport=37682 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 37682 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 92.86.167.42 serverIP: 231.136.79.99
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=234.242.175.203 dst=220.180.235.96 protocol=tcp sport=443 dport=38102 decision=blocked
{ "action": "block", "clientport": 38102, "message": "<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=234.242.175.203 dst=220.180.235.96 protocol=tcp sport=443 dport=38102 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "220.180.235.96", "serverIP": "234.242.175.203" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=234.242.175.203 dst=220.180.235.96 protocol=tcp sport=443 dport=38102 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=234.242.175.203 dst=220.180.235.96 protocol=tcp sport=443 dport=38102 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 38102 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 220.180.235.96 serverIP: 234.242.175.203
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=0.25.99.224 dst=89.106.132.24 protocol=tcp sport=443 dport=38102 decision=blocked
{ "action": "block", "clientport": 38102, "message": "<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=0.25.99.224 dst=89.106.132.24 protocol=tcp sport=443 dport=38102 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "89.106.132.24", "serverIP": "0.25.99.224" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=0.25.99.224 dst=89.106.132.24 protocol=tcp sport=443 dport=38102 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=0.25.99.224 dst=89.106.132.24 protocol=tcp sport=443 dport=38102 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 38102 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 89.106.132.24 serverIP: 0.25.99.224
Explain this syslog message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=194.148.171.230 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.162.4.37 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.162.4.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 56566, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1689445746162 ", "message": "<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=194.148.171.230 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=158.162.4.37 spt=56566 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.162.4.37 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "ProxyIP:35.233.62.116", "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "158.162.4.37", "serverIP": "194.148.171.230", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=194.148.171.230 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.162.4.37 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.162.4.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=194.148.171.230 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.162.4.37 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.162.4.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 56566 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1689445746162 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['ProxyIP:35.233.62.116', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 158.162.4.37 serverIP: 194.148.171.230 userName: -
Explain this syslog message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=173.94.123.250 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=224.245.96.61 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.245.96.61 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 56566, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1689445746162 ", "message": "<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=173.94.123.250 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=224.245.96.61 spt=56566 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.245.96.61 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "ProxyIP:35.233.62.116", "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "224.245.96.61", "serverIP": "173.94.123.250", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=173.94.123.250 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=224.245.96.61 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.245.96.61 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=173.94.123.250 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=224.245.96.61 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.245.96.61 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 56566 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1689445746162 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['ProxyIP:35.233.62.116', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 224.245.96.61 serverIP: 173.94.123.250 userName: -
Explain this syslog message
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=23.230.102.161 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.28.44.42 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.28.44.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59515, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/global-protect/login.esp", "localhostname": "WAFirewall", "localstarttime": "1689445173444 ", "message": "<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=23.230.102.161 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=139.28.44.42 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication=\"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)\" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.28.44.42 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:194.26.192.17", "RuleID:global" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "139.28.44.42", "serverIP": "23.230.102.161", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=23.230.102.161 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.28.44.42 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.28.44.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=23.230.102.161 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.28.44.42 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.28.44.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59515 facilitycode: 23 facilitylabel: local7 fqdn: /global-protect/login.esp localhostname: WAFirewall localstarttime: 1689445173444 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:194.26.192.17', 'RuleID:global'] vendorcode: 342 streamName: barracuda_waf clientIP: 139.28.44.42 serverIP: 23.230.102.161 userName: -
Explain this syslog message
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.22.133.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=176.215.98.107 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.215.98.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59515, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/global-protect/login.esp", "localhostname": "WAFirewall", "localstarttime": "1689445173444 ", "message": "<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.22.133.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=176.215.98.107 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication=\"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)\" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.215.98.107 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:194.26.192.17", "RuleID:global" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "176.215.98.107", "serverIP": "126.22.133.138", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.22.133.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=176.215.98.107 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.215.98.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.22.133.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=176.215.98.107 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.215.98.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59515 facilitycode: 23 facilitylabel: local7 fqdn: /global-protect/login.esp localhostname: WAFirewall localstarttime: 1689445173444 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:194.26.192.17', 'RuleID:global'] vendorcode: 342 streamName: barracuda_waf clientIP: 176.215.98.107 serverIP: 126.22.133.138 userName: -
Explain this syslog message
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.174.67.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=85.152.115.158 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.152.115.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59515, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/global-protect/login.esp", "localhostname": "WAFirewall", "localstarttime": "1689445173444 ", "message": "<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.174.67.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=85.152.115.158 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication=\"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)\" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.152.115.158 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:194.26.192.17", "RuleID:global" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "85.152.115.158", "serverIP": "67.174.67.61", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.174.67.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=85.152.115.158 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.152.115.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.174.67.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=85.152.115.158 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.152.115.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59515 facilitycode: 23 facilitylabel: local7 fqdn: /global-protect/login.esp localhostname: WAFirewall localstarttime: 1689445173444 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:194.26.192.17', 'RuleID:global'] vendorcode: 342 streamName: barracuda_waf clientIP: 85.152.115.158 serverIP: 67.174.67.61 userName: -
Explain this syslog message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.161.253.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=60.239.28.122 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=60.239.28.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 56566, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1689445746162 ", "message": "<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.161.253.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=60.239.28.122 spt=56566 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=60.239.28.122 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "ProxyIP:35.233.62.116", "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "60.239.28.122", "serverIP": "0.161.253.218", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.161.253.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=60.239.28.122 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=60.239.28.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.161.253.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=60.239.28.122 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=60.239.28.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 56566 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1689445746162 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['ProxyIP:35.233.62.116', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 60.239.28.122 serverIP: 0.161.253.218 userName: -
Explain this syslog message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.52.33.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.205.177.209 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.205.177.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 56566, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1689445746162 ", "message": "<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.52.33.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=241.205.177.209 spt=56566 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.205.177.209 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "ProxyIP:35.233.62.116", "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "241.205.177.209", "serverIP": "200.52.33.128", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.52.33.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.205.177.209 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.205.177.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.52.33.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.205.177.209 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.205.177.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 56566 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1689445746162 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['ProxyIP:35.233.62.116', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 241.205.177.209 serverIP: 200.52.33.128 userName: -
Explain this syslog message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.168.86.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.252.198.42 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.252.198.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 56566, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1689445746162 ", "message": "<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.168.86.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=191.252.198.42 spt=56566 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.252.198.42 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "ProxyIP:35.233.62.116", "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "191.252.198.42", "serverIP": "68.168.86.208", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.168.86.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.252.198.42 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.252.198.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.168.86.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.252.198.42 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.252.198.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 56566 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1689445746162 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['ProxyIP:35.233.62.116', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 191.252.198.42 serverIP: 68.168.86.208 userName: -
Explain this syslog message