input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<172>Mar 27 2023 15:31:13 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:109.222.0.2/51307 dst outside:87.192.160.255/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 51307
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 109.222.0.2
serverIP: 87.192.160.255 | Explain this syslog message |
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=255.168.21.238 dpt=443 act=DENY msg=["-"] duser="-" src=242.84.116.186 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.84.116.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:34.245.128.35",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=255.168.21.238 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=242.84.116.186 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication=\"Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)\" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.84.116.186 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1662357081833 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "SLASH_DOT_IN_URL",
"severitycode": 9,
"fqdn": "//config/.env",
"clientport": 46168,
"vendorcode": "14",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "242.84.116.186",
"serverIP": "255.168.21.238",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=255.168.21.238 dpt=443 act=DENY msg=["-"] duser="-" src=242.84.116.186 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.84.116.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=255.168.21.238 dpt=443 act=DENY msg=["-"] duser="-" src=242.84.116.186 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.84.116.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:34.245.128.35', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1662357081833
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: SLASH_DOT_IN_URL
severitycode: 9
fqdn: //config/.env
clientport: 46168
vendorcode: 14
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 242.84.116.186
serverIP: 255.168.21.238
userName: - | Explain this syslog message |
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=7.222.200.214 dpt=443 act=DENY msg=["-"] duser="-" src=177.180.187.192 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.180.187.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:34.245.128.35",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=7.222.200.214 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=177.180.187.192 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication=\"Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)\" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.180.187.192 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1662357081472 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "SLASH_DOT_IN_URL",
"severitycode": 9,
"fqdn": "//database/.env",
"clientport": 46154,
"vendorcode": "14",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "177.180.187.192",
"serverIP": "7.222.200.214",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=7.222.200.214 dpt=443 act=DENY msg=["-"] duser="-" src=177.180.187.192 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.180.187.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=7.222.200.214 dpt=443 act=DENY msg=["-"] duser="-" src=177.180.187.192 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=177.180.187.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:34.245.128.35', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1662357081472
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: SLASH_DOT_IN_URL
severitycode: 9
fqdn: //database/.env
clientport: 46154
vendorcode: 14
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 177.180.187.192
serverIP: 7.222.200.214
userName: - | Explain this syslog message |
<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=142.124.218.95 dpt=443 act=DENY msg=["-"] duser="-" src=231.76.209.164 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.76.209.164 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:34.245.128.35",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=142.124.218.95 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=231.76.209.164 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication=\"Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)\" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.76.209.164 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1662357087322 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "SLASH_DOT_IN_URL",
"severitycode": 9,
"fqdn": "//tools/.env",
"clientport": 37906,
"vendorcode": "14",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "231.76.209.164",
"serverIP": "142.124.218.95",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=142.124.218.95 dpt=443 act=DENY msg=["-"] duser="-" src=231.76.209.164 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.76.209.164 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=142.124.218.95 dpt=443 act=DENY msg=["-"] duser="-" src=231.76.209.164 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=231.76.209.164 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:34.245.128.35', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1662357087322
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: SLASH_DOT_IN_URL
severitycode: 9
fqdn: //tools/.env
clientport: 37906
vendorcode: 14
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 231.76.209.164
serverIP: 142.124.218.95
userName: - | Explain this syslog message |
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=40.244.52.34 dpt=443 act=DENY msg=["-"] duser="-" src=130.179.15.3 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.179.15.3 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:34.245.128.35",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=40.244.52.34 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=130.179.15.3 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication=\"Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)\" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.179.15.3 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1662357081833 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "SLASH_DOT_IN_URL",
"severitycode": 9,
"fqdn": "//config/.env",
"clientport": 46168,
"vendorcode": "14",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "130.179.15.3",
"serverIP": "40.244.52.34",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=40.244.52.34 dpt=443 act=DENY msg=["-"] duser="-" src=130.179.15.3 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.179.15.3 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=40.244.52.34 dpt=443 act=DENY msg=["-"] duser="-" src=130.179.15.3 spt=46168 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081833 request=//config/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340ee9-b952a70 cn2=46168 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.179.15.3 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:34.245.128.35', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1662357081833
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: SLASH_DOT_IN_URL
severitycode: 9
fqdn: //config/.env
clientport: 46168
vendorcode: 14
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 130.179.15.3
serverIP: 40.244.52.34
userName: - | Explain this syslog message |
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=147.74.233.22 dpt=443 act=DENY msg=["-"] duser="-" src=210.26.253.40 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=210.26.253.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:34.245.128.35",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=147.74.233.22 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=210.26.253.40 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication=\"Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)\" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=210.26.253.40 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1662357081472 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "SLASH_DOT_IN_URL",
"severitycode": 9,
"fqdn": "//database/.env",
"clientport": 46154,
"vendorcode": "14",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "210.26.253.40",
"serverIP": "147.74.233.22",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=147.74.233.22 dpt=443 act=DENY msg=["-"] duser="-" src=210.26.253.40 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=210.26.253.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 5 00:51:21 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=147.74.233.22 dpt=443 act=DENY msg=["-"] duser="-" src=210.26.253.40 spt=46154 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:21 rt=1662357081472 request=//database/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c340d80-9ecabe cn2=46154 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=210.26.253.40 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:34.245.128.35', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1662357081472
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: SLASH_DOT_IN_URL
severitycode: 9
fqdn: //database/.env
clientport: 46154
vendorcode: 14
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 210.26.253.40
serverIP: 147.74.233.22
userName: - | Explain this syslog message |
<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=179.107.113.75 dpt=443 act=DENY msg=["-"] duser="-" src=103.93.156.235 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=103.93.156.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_SLASH_DOT_IN_URL",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:34.245.128.35",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"rfc3164",
"SLASH_DOT_IN_URL",
"RuleID:security-policy",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=179.107.113.75 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=103.93.156.235 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication=\"Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)\" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=103.93.156.235 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1662357087322 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "SLASH_DOT_IN_URL",
"severitycode": 9,
"fqdn": "//tools/.env",
"clientport": 37906,
"vendorcode": "14",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "103.93.156.235",
"serverIP": "179.107.113.75",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=179.107.113.75 dpt=443 act=DENY msg=["-"] duser="-" src=103.93.156.235 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=103.93.156.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 5 00:51:27 WAFirewall CEF:0|Barracuda|WAF|1101|14|SLASH_DOT_IN_URL|1|cat=WF dst=179.107.113.75 dpt=443 act=DENY msg=["-"] duser="-" src=103.93.156.235 spt=37906 requestMethod=GET app=TLSv1.3 requestContext=https://www.google.com/ start=Sep 05 2022 00:51:27 rt=1662357087322 request=//tools/.env requestClientApplication="Mozilla/5.0 (Windows; U; MSIE 8.0; Linux i386; .NET CLR 1.5.10169; X11)" dvchost=WAFirewall externalId=1830c342459-df93ebb1 cn2=37906 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=103.93.156.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_SLASH_DOT_IN_URL', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:34.245.128.35', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'rfc3164', 'SLASH_DOT_IN_URL', 'RuleID:security-policy', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1662357087322
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: SLASH_DOT_IN_URL
severitycode: 9
fqdn: //tools/.env
clientport: 37906
vendorcode: 14
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 103.93.156.235
serverIP: 179.107.113.75
userName: - | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=39.94.0.154 dst=85.79.57.168 protocol=udp sport=50021 dport=39401 decision=blocked | {
"action": "block",
"clientport": 50021,
"message": "<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=39.94.0.154 dst=85.79.57.168 protocol=udp sport=50021 dport=39401 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 39401,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "39.94.0.154",
"serverIP": "85.79.57.168"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=39.94.0.154 dst=85.79.57.168 protocol=udp sport=50021 dport=39401 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=39.94.0.154 dst=85.79.57.168 protocol=udp sport=50021 dport=39401 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 50021
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 39401
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 39.94.0.154
serverIP: 85.79.57.168 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=143.39.67.30 dst=25.60.100.249 protocol=udp sport=50021 dport=39401 decision=blocked | {
"action": "block",
"clientport": 50021,
"message": "<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=143.39.67.30 dst=25.60.100.249 protocol=udp sport=50021 dport=39401 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 39401,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "143.39.67.30",
"serverIP": "25.60.100.249"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=143.39.67.30 dst=25.60.100.249 protocol=udp sport=50021 dport=39401 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=143.39.67.30 dst=25.60.100.249 protocol=udp sport=50021 dport=39401 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 50021
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 39401
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 143.39.67.30
serverIP: 25.60.100.249 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=171.202.136.133 dst=196.226.29.6 protocol=udp sport=50021 dport=39401 decision=blocked | {
"action": "block",
"clientport": 50021,
"message": "<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=171.202.136.133 dst=196.226.29.6 protocol=udp sport=50021 dport=39401 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 39401,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "171.202.136.133",
"serverIP": "196.226.29.6"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=171.202.136.133 dst=196.226.29.6 protocol=udp sport=50021 dport=39401 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=171.202.136.133 dst=196.226.29.6 protocol=udp sport=50021 dport=39401 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 50021
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 39401
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 171.202.136.133
serverIP: 196.226.29.6 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=241.114.118.243 dst=208.233.220.39 protocol=udp sport=50021 dport=39401 decision=blocked | {
"action": "block",
"clientport": 50021,
"message": "<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=241.114.118.243 dst=208.233.220.39 protocol=udp sport=50021 dport=39401 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 39401,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "241.114.118.243",
"serverIP": "208.233.220.39"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=241.114.118.243 dst=208.233.220.39 protocol=udp sport=50021 dport=39401 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1688780023.447732335 M93_MX67C_MECCumming l7_firewall src=241.114.118.243 dst=208.233.220.39 protocol=udp sport=50021 dport=39401 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 50021
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 39401
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 241.114.118.243
serverIP: 208.233.220.39 | Explain this syslog message |
<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.127.70.243 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=246.118.42.203 spt=36328 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=246.118.42.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:179.43.177.242",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.127.70.243 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=246.118.42.203 spt=36328 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication=\"Hello World\" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=246.118.42.203 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675825650292 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 36328,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "246.118.42.203",
"serverIP": "155.127.70.243",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.127.70.243 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=246.118.42.203 spt=36328 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=246.118.42.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=155.127.70.243 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=246.118.42.203 spt=36328 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=246.118.42.203 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:179.43.177.242', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675825650292
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 36328
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 246.118.42.203
serverIP: 155.127.70.243
userName: - | Explain this syslog message |
<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=93.238.211.225 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.218.140.241 spt=36328 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.218.140.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"ProxyIP:179.43.177.242",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=93.238.211.225 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=216.218.140.241 spt=36328 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication=\"Hello World\" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.218.140.241 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675825650292 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 36328,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "216.218.140.241",
"serverIP": "93.238.211.225",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=93.238.211.225 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.218.140.241 spt=36328 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.218.140.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 7 21:07:30 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=93.238.211.225 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.218.140.241 spt=36328 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 21:07:30 rt=1675825650292 request=/ requestClientApplication="Hello World" dvchost=WAFirewall externalId=1862efe1a74-78fd4604 cn2=36328 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.218.140.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'ProxyIP:179.43.177.242', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675825650292
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 36328
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 216.218.140.241
serverIP: 93.238.211.225
userName: - | Explain this syslog message |
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=70.147.63.229 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.60.89.221 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.60.89.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:193.106.29.122",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=70.147.63.229 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=118.60.89.221 spt=64566 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication=\"Mozilla/5.0\" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.60.89.221 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675398034393 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 64566,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "118.60.89.221",
"serverIP": "70.147.63.229",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=70.147.63.229 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.60.89.221 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.60.89.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=70.147.63.229 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.60.89.221 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.60.89.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:193.106.29.122', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675398034393
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 64566
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 118.60.89.221
serverIP: 70.147.63.229
userName: - | Explain this syslog message |
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=250.149.150.89 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.242.118.35 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.242.118.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:193.106.29.122",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=250.149.150.89 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=21.242.118.35 spt=64566 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication=\"Mozilla/5.0\" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.242.118.35 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675398034393 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 64566,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "21.242.118.35",
"serverIP": "250.149.150.89",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=250.149.150.89 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.242.118.35 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.242.118.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=250.149.150.89 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.242.118.35 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.242.118.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:193.106.29.122', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675398034393
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 64566
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 21.242.118.35
serverIP: 250.149.150.89
userName: - | Explain this syslog message |
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.200.200.157 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=190.249.2.9 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=190.249.2.9 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:193.106.29.122",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.200.200.157 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=190.249.2.9 spt=64566 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication=\"Mozilla/5.0\" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=190.249.2.9 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675398034393 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 64566,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "190.249.2.9",
"serverIP": "115.200.200.157",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.200.200.157 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=190.249.2.9 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=190.249.2.9 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 2 22:20:34 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=115.200.200.157 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=190.249.2.9 spt=64566 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 02 2023 22:20:34 rt=1675398034393 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=186158133d9-3df960ea cn2=64566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=190.249.2.9 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:193.106.29.122', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675398034393
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 64566
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 190.249.2.9
serverIP: 115.200.200.157
userName: - | Explain this syslog message |
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=65.228.169.116 dst=63.244.35.122 protocol=tcp sport=56515 dport=443 decision=blocked | {
"action": "block",
"clientport": 56515,
"message": "<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=65.228.169.116 dst=63.244.35.122 protocol=tcp sport=56515 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "65.228.169.116",
"serverIP": "63.244.35.122"
} | Create a JSON artifact from the message |
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=65.228.169.116 dst=63.244.35.122 protocol=tcp sport=56515 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=65.228.169.116 dst=63.244.35.122 protocol=tcp sport=56515 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56515
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 65.228.169.116
serverIP: 63.244.35.122 | Explain this syslog message |
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=172.40.62.162 dst=21.57.146.171 protocol=tcp sport=56515 dport=443 decision=blocked | {
"action": "block",
"clientport": 56515,
"message": "<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=172.40.62.162 dst=21.57.146.171 protocol=tcp sport=56515 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "172.40.62.162",
"serverIP": "21.57.146.171"
} | Create a JSON artifact from the message |
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=172.40.62.162 dst=21.57.146.171 protocol=tcp sport=56515 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=172.40.62.162 dst=21.57.146.171 protocol=tcp sport=56515 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56515
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 172.40.62.162
serverIP: 21.57.146.171 | Explain this syslog message |
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=225.80.13.223 dst=125.220.170.220 protocol=tcp sport=56515 dport=443 decision=blocked | {
"action": "block",
"clientport": 56515,
"message": "<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=225.80.13.223 dst=125.220.170.220 protocol=tcp sport=56515 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "225.80.13.223",
"serverIP": "125.220.170.220"
} | Create a JSON artifact from the message |
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=225.80.13.223 dst=125.220.170.220 protocol=tcp sport=56515 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=225.80.13.223 dst=125.220.170.220 protocol=tcp sport=56515 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56515
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 225.80.13.223
serverIP: 125.220.170.220 | Explain this syslog message |
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=187.142.142.38 dst=8.130.3.122 protocol=tcp sport=56515 dport=443 decision=blocked | {
"action": "block",
"clientport": 56515,
"message": "<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=187.142.142.38 dst=8.130.3.122 protocol=tcp sport=56515 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "187.142.142.38",
"serverIP": "8.130.3.122"
} | Create a JSON artifact from the message |
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=187.142.142.38 dst=8.130.3.122 protocol=tcp sport=56515 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.73.78.193 1 1686392256.185845899 M35_MX67C_MMIRagsdale l7_firewall src=187.142.142.38 dst=8.130.3.122 protocol=tcp sport=56515 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 56515
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 187.142.142.38
serverIP: 8.130.3.122 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=201.167.40.190 dst=67.102.207.87 protocol=tcp sport=443 dport=37682 decision=blocked | {
"action": "block",
"clientport": 37682,
"message": "<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=201.167.40.190 dst=67.102.207.87 protocol=tcp sport=443 dport=37682 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "67.102.207.87",
"serverIP": "201.167.40.190"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=201.167.40.190 dst=67.102.207.87 protocol=tcp sport=443 dport=37682 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=201.167.40.190 dst=67.102.207.87 protocol=tcp sport=443 dport=37682 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 37682
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 67.102.207.87
serverIP: 201.167.40.190 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=85.132.232.200 dst=99.228.29.181 protocol=tcp sport=443 dport=37682 decision=blocked | {
"action": "block",
"clientport": 37682,
"message": "<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=85.132.232.200 dst=99.228.29.181 protocol=tcp sport=443 dport=37682 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "99.228.29.181",
"serverIP": "85.132.232.200"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=85.132.232.200 dst=99.228.29.181 protocol=tcp sport=443 dport=37682 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=85.132.232.200 dst=99.228.29.181 protocol=tcp sport=443 dport=37682 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 37682
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 99.228.29.181
serverIP: 85.132.232.200 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=192.54.18.242 dst=144.123.222.230 protocol=tcp sport=443 dport=37682 decision=blocked | {
"action": "block",
"clientport": 37682,
"message": "<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=192.54.18.242 dst=144.123.222.230 protocol=tcp sport=443 dport=37682 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "144.123.222.230",
"serverIP": "192.54.18.242"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=192.54.18.242 dst=144.123.222.230 protocol=tcp sport=443 dport=37682 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=192.54.18.242 dst=144.123.222.230 protocol=tcp sport=443 dport=37682 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 37682
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 144.123.222.230
serverIP: 192.54.18.242 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=231.136.79.99 dst=92.86.167.42 protocol=tcp sport=443 dport=37682 decision=blocked | {
"action": "block",
"clientport": 37682,
"message": "<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=231.136.79.99 dst=92.86.167.42 protocol=tcp sport=443 dport=37682 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "92.86.167.42",
"serverIP": "231.136.79.99"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=231.136.79.99 dst=92.86.167.42 protocol=tcp sport=443 dport=37682 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690532333.739081162 NORDC_MX400_1 l7_firewall src=231.136.79.99 dst=92.86.167.42 protocol=tcp sport=443 dport=37682 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 37682
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 92.86.167.42
serverIP: 231.136.79.99 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=234.242.175.203 dst=220.180.235.96 protocol=tcp sport=443 dport=38102 decision=blocked | {
"action": "block",
"clientport": 38102,
"message": "<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=234.242.175.203 dst=220.180.235.96 protocol=tcp sport=443 dport=38102 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "220.180.235.96",
"serverIP": "234.242.175.203"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=234.242.175.203 dst=220.180.235.96 protocol=tcp sport=443 dport=38102 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=234.242.175.203 dst=220.180.235.96 protocol=tcp sport=443 dport=38102 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 38102
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 220.180.235.96
serverIP: 234.242.175.203 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=0.25.99.224 dst=89.106.132.24 protocol=tcp sport=443 dport=38102 decision=blocked | {
"action": "block",
"clientport": 38102,
"message": "<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=0.25.99.224 dst=89.106.132.24 protocol=tcp sport=443 dport=38102 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "89.106.132.24",
"serverIP": "0.25.99.224"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=0.25.99.224 dst=89.106.132.24 protocol=tcp sport=443 dport=38102 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690530500.335548395 NORDC_MX400_1 l7_firewall src=0.25.99.224 dst=89.106.132.24 protocol=tcp sport=443 dport=38102 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 38102
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 89.106.132.24
serverIP: 0.25.99.224 | Explain this syslog message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=194.148.171.230 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.162.4.37 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.162.4.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 56566,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1689445746162 ",
"message": "<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=194.148.171.230 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=158.162.4.37 spt=56566 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.162.4.37 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:35.233.62.116",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "158.162.4.37",
"serverIP": "194.148.171.230",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=194.148.171.230 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.162.4.37 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.162.4.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=194.148.171.230 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.162.4.37 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.162.4.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 56566
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1689445746162
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:35.233.62.116', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 158.162.4.37
serverIP: 194.148.171.230
userName: - | Explain this syslog message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=173.94.123.250 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=224.245.96.61 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.245.96.61 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 56566,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1689445746162 ",
"message": "<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=173.94.123.250 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=224.245.96.61 spt=56566 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.245.96.61 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:35.233.62.116",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "224.245.96.61",
"serverIP": "173.94.123.250",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=173.94.123.250 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=224.245.96.61 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.245.96.61 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=173.94.123.250 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=224.245.96.61 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=224.245.96.61 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 56566
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1689445746162
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:35.233.62.116', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 224.245.96.61
serverIP: 173.94.123.250
userName: - | Explain this syslog message |
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=23.230.102.161 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.28.44.42 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.28.44.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59515,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/global-protect/login.esp",
"localhostname": "WAFirewall",
"localstarttime": "1689445173444 ",
"message": "<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=23.230.102.161 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=139.28.44.42 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication=\"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)\" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.28.44.42 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:194.26.192.17",
"RuleID:global"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "139.28.44.42",
"serverIP": "23.230.102.161",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=23.230.102.161 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.28.44.42 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.28.44.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=23.230.102.161 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=139.28.44.42 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=139.28.44.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59515
facilitycode: 23
facilitylabel: local7
fqdn: /global-protect/login.esp
localhostname: WAFirewall
localstarttime: 1689445173444
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:194.26.192.17', 'RuleID:global']
vendorcode: 342
streamName: barracuda_waf
clientIP: 139.28.44.42
serverIP: 23.230.102.161
userName: - | Explain this syslog message |
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.22.133.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=176.215.98.107 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.215.98.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59515,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/global-protect/login.esp",
"localhostname": "WAFirewall",
"localstarttime": "1689445173444 ",
"message": "<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.22.133.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=176.215.98.107 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication=\"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)\" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.215.98.107 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:194.26.192.17",
"RuleID:global"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "176.215.98.107",
"serverIP": "126.22.133.138",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.22.133.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=176.215.98.107 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.215.98.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=126.22.133.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=176.215.98.107 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.215.98.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59515
facilitycode: 23
facilitylabel: local7
fqdn: /global-protect/login.esp
localhostname: WAFirewall
localstarttime: 1689445173444
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:194.26.192.17', 'RuleID:global']
vendorcode: 342
streamName: barracuda_waf
clientIP: 176.215.98.107
serverIP: 126.22.133.138
userName: - | Explain this syslog message |
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.174.67.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=85.152.115.158 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.152.115.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59515,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/global-protect/login.esp",
"localhostname": "WAFirewall",
"localstarttime": "1689445173444 ",
"message": "<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.174.67.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=85.152.115.158 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication=\"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)\" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.152.115.158 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:194.26.192.17",
"RuleID:global"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "85.152.115.158",
"serverIP": "67.174.67.61",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.174.67.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=85.152.115.158 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.152.115.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 15 13:19:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=67.174.67.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=85.152.115.158 spt=59515 requestMethod=HEAD app=TLSv1.2 requestContext=https://12.166.83.91:443/global-protect/login.esp start=Jul 15 2023 13:19:33 rt=1689445173444 request=/global-protect/login.esp requestClientApplication="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" dvchost=WAFirewall externalId=1895ac788b5-deb8604b cn2=59515 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=85.152.115.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59515
facilitycode: 23
facilitylabel: local7
fqdn: /global-protect/login.esp
localhostname: WAFirewall
localstarttime: 1689445173444
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:194.26.192.17', 'RuleID:global']
vendorcode: 342
streamName: barracuda_waf
clientIP: 85.152.115.158
serverIP: 67.174.67.61
userName: - | Explain this syslog message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.161.253.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=60.239.28.122 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=60.239.28.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 56566,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1689445746162 ",
"message": "<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.161.253.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=60.239.28.122 spt=56566 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=60.239.28.122 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:35.233.62.116",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "60.239.28.122",
"serverIP": "0.161.253.218",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.161.253.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=60.239.28.122 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=60.239.28.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=0.161.253.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=60.239.28.122 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=60.239.28.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 56566
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1689445746162
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:35.233.62.116', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 60.239.28.122
serverIP: 0.161.253.218
userName: - | Explain this syslog message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.52.33.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.205.177.209 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.205.177.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 56566,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1689445746162 ",
"message": "<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.52.33.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=241.205.177.209 spt=56566 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.205.177.209 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:35.233.62.116",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "241.205.177.209",
"serverIP": "200.52.33.128",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.52.33.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.205.177.209 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.205.177.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.52.33.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.205.177.209 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.205.177.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 56566
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1689445746162
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:35.233.62.116', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 241.205.177.209
serverIP: 200.52.33.128
userName: - | Explain this syslog message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.168.86.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.252.198.42 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.252.198.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 56566,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1689445746162 ",
"message": "<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.168.86.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=191.252.198.42 spt=56566 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication=\"python-requests/2.31.0\" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.252.198.42 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:35.233.62.116",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "191.252.198.42",
"serverIP": "68.168.86.208",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.168.86.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.252.198.42 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.252.198.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 15 13:29:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.168.86.208 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.252.198.42 spt=56566 requestMethod=GET app=HTTP requestContext="-" start=Jul 15 2023 13:29:06 rt=1689445746162 request=/ requestClientApplication="python-requests/2.31.0" dvchost=WAFirewall externalId=1895ad045ea-1c25fa6 cn2=56566 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.252.198.42 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 56566
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1689445746162
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:35.233.62.116', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 191.252.198.42
serverIP: 68.168.86.208
userName: - | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.