input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<185>Aug 19 22:35:52 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=206.245.215.111 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=66.153.181.57 spt=47932 requestMethod=GET app=HTTP requestContext="-" start=Aug 19 2022 22:35:52 rt=1660966552509 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182b95243bd-e2f78f2b cn2=47932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=66.153.181.57 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 22:35:52 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=206.245.215.111 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=66.153.181.57 spt=47932 requestMethod=GET app=HTTP requestContext="-" start=Aug 19 2022 22:35:52 rt=1660966552509 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182b95243bd-e2f78f2b cn2=47932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=66.153.181.57 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:193.118.53.210', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1660966552509 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 47932 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 66.153.181.57 serverIP: 206.245.215.111 userName: -
Explain this syslog message
WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"20.147.245.112","externalIp":"44.151.78.229","categories":["Malware","Not Actionable"],"tags":[],"destination":"captchasafe.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-15T18:14:50.000Z"} ::: clientIP=20.147.245.112 ::: serverIP=44.151.78.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "captchasafe.top", "message": "WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"20.147.245.112\",\"externalIp\":\"44.151.78.229\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captchasafe.top\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T18:14:50.000Z\"} ::: clientIP=20.147.245.112 ::: serverIP=44.151.78.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "captchasafe.top", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-15T18:14:50.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareNot Actionable", "streamName": "OpenDNS Detection", "clientIP": "20.147.245.112", "serverIP": "44.151.78.229", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"20.147.245.112","externalIp":"44.151.78.229","categories":["Malware","Not Actionable"],"tags":[],"destination":"captchasafe.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-15T18:14:50.000Z"} ::: clientIP=20.147.245.112 ::: serverIP=44.151.78.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"20.147.245.112","externalIp":"44.151.78.229","categories":["Malware","Not Actionable"],"tags":[],"destination":"captchasafe.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-15T18:14:50.000Z"} ::: clientIP=20.147.245.112 ::: serverIP=44.151.78.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: captchasafe.top messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: captchasafe.top severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-15T18:14:50.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareNot Actionable streamName: OpenDNS Detection clientIP: 20.147.245.112 serverIP: 44.151.78.229 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"53.119.120.116","externalIp":"213.148.33.229","categories":["Malware","Not Actionable"],"tags":[],"destination":"captchasafe.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-15T18:14:50.000Z"} ::: clientIP=53.119.120.116 ::: serverIP=213.148.33.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "captchasafe.top", "message": "WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"53.119.120.116\",\"externalIp\":\"213.148.33.229\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captchasafe.top\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T18:14:50.000Z\"} ::: clientIP=53.119.120.116 ::: serverIP=213.148.33.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "captchasafe.top", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-15T18:14:50.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "MalwareNot Actionable", "streamName": "OpenDNS Detection", "clientIP": "53.119.120.116", "serverIP": "213.148.33.229", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"53.119.120.116","externalIp":"213.148.33.229","categories":["Malware","Not Actionable"],"tags":[],"destination":"captchasafe.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-15T18:14:50.000Z"} ::: clientIP=53.119.120.116 ::: serverIP=213.148.33.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"53.119.120.116","externalIp":"213.148.33.229","categories":["Malware","Not Actionable"],"tags":[],"destination":"captchasafe.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-15T18:14:50.000Z"} ::: clientIP=53.119.120.116 ::: serverIP=213.148.33.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: captchasafe.top messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: captchasafe.top severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-15T18:14:50.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: MalwareNot Actionable streamName: OpenDNS Detection clientIP: 53.119.120.116 serverIP: 213.148.33.229 userName: nighthawk
Explain this syslog message
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=219.245.56.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.97.153.30 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.97.153.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:114.119.131.195", "rfc3164" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=219.245.56.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=184.97.153.30 spt=57889 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.97.153.30 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1665786115842 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/robots.txt", "clientport": 57889, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "184.97.153.30", "serverIP": "219.245.56.52", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=219.245.56.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.97.153.30 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.97.153.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=219.245.56.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.97.153.30 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.97.153.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:114.119.131.195', 'rfc3164'] productids: [0] sourceinfo: unknown localstarttime: 1665786115842 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /robots.txt clientport: 57889 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 184.97.153.30 serverIP: 219.245.56.52 userName: -
Explain this syslog message
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=222.87.199.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=88.229.87.235 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.229.87.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:114.119.131.195", "rfc3164" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=222.87.199.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=88.229.87.235 spt=57889 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.229.87.235 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1665786115842 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/robots.txt", "clientport": 57889, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "88.229.87.235", "serverIP": "222.87.199.33", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=222.87.199.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=88.229.87.235 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.229.87.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=222.87.199.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=88.229.87.235 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.229.87.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:114.119.131.195', 'rfc3164'] productids: [0] sourceinfo: unknown localstarttime: 1665786115842 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /robots.txt clientport: 57889 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 88.229.87.235 serverIP: 222.87.199.33 userName: -
Explain this syslog message
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=202.200.30.31 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=185.224.218.209 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.224.218.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:114.119.131.195", "rfc3164" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=202.200.30.31 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=185.224.218.209 spt=57889 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.224.218.209 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1665786115842 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/robots.txt", "clientport": 57889, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "185.224.218.209", "serverIP": "202.200.30.31", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=202.200.30.31 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=185.224.218.209 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.224.218.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=202.200.30.31 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=185.224.218.209 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.224.218.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:114.119.131.195', 'rfc3164'] productids: [0] sourceinfo: unknown localstarttime: 1665786115842 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /robots.txt clientport: 57889 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 185.224.218.209 serverIP: 202.200.30.31 userName: -
Explain this syslog message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=245.128.111.155 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=59.24.42.196 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.24.42.196 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53281, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1692477980949 ", "message": "<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=245.128.111.155 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=59.24.42.196 spt=53281 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.24.42.196 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:192.64.4.252" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "59.24.42.196", "serverIP": "245.128.111.155", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=245.128.111.155 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=59.24.42.196 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.24.42.196 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=245.128.111.155 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=59.24.42.196 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.24.42.196 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53281 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1692477980949 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252'] vendorcode: 342 streamName: barracuda_waf clientIP: 59.24.42.196 serverIP: 245.128.111.155 userName: -
Explain this syslog message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.242.214.46 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=8.133.32.192 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.133.32.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53281, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1692477980949 ", "message": "<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.242.214.46 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=8.133.32.192 spt=53281 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.133.32.192 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:192.64.4.252" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "8.133.32.192", "serverIP": "254.242.214.46", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.242.214.46 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=8.133.32.192 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.133.32.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.242.214.46 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=8.133.32.192 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.133.32.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53281 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1692477980949 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252'] vendorcode: 342 streamName: barracuda_waf clientIP: 8.133.32.192 serverIP: 254.242.214.46 userName: -
Explain this syslog message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=160.236.151.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.41.144.224 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.41.144.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53281, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1692477980949 ", "message": "<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=160.236.151.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=151.41.144.224 spt=53281 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.41.144.224 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:192.64.4.252" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "151.41.144.224", "serverIP": "160.236.151.137", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=160.236.151.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.41.144.224 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.41.144.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=160.236.151.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.41.144.224 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.41.144.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53281 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1692477980949 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252'] vendorcode: 342 streamName: barracuda_waf clientIP: 151.41.144.224 serverIP: 160.236.151.137 userName: -
Explain this syslog message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=14.126.1.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.9.189.201 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.9.189.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53281, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1692477980949 ", "message": "<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=14.126.1.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=10.9.189.201 spt=53281 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.9.189.201 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:192.64.4.252" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "10.9.189.201", "serverIP": "14.126.1.204", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=14.126.1.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.9.189.201 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.9.189.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=14.126.1.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.9.189.201 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.9.189.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53281 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1692477980949 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252'] vendorcode: 342 streamName: barracuda_waf clientIP: 10.9.189.201 serverIP: 14.126.1.204 userName: -
Explain this syslog message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.191.160.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=48.15.166.218 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=48.15.166.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53281, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1692477980949 ", "message": "<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.191.160.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=48.15.166.218 spt=53281 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=48.15.166.218 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:192.64.4.252" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "48.15.166.218", "serverIP": "254.191.160.89", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.191.160.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=48.15.166.218 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=48.15.166.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.191.160.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=48.15.166.218 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=48.15.166.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53281 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1692477980949 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252'] vendorcode: 342 streamName: barracuda_waf clientIP: 48.15.166.218 serverIP: 254.191.160.89 userName: -
Explain this syslog message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.94.63.118 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.115.216.46 spt=55053 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.115.216.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 55053, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/bk", "localhostname": "WAFirewall", "localstarttime": "1692477981446 ", "message": "<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.94.63.118 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=93.115.216.46 spt=55053 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.115.216.46 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:192.64.4.252" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "93.115.216.46", "serverIP": "247.94.63.118", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.94.63.118 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.115.216.46 spt=55053 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.115.216.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.94.63.118 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.115.216.46 spt=55053 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.115.216.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 55053 facilitycode: 23 facilitylabel: local7 fqdn: /bk localhostname: WAFirewall localstarttime: 1692477981446 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252'] vendorcode: 342 streamName: barracuda_waf clientIP: 93.115.216.46 serverIP: 247.94.63.118 userName: -
Explain this syslog message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.187.249.13 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=84.66.173.78 spt=55053 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=84.66.173.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 55053, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/bk", "localhostname": "WAFirewall", "localstarttime": "1692477981446 ", "message": "<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.187.249.13 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=84.66.173.78 spt=55053 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=84.66.173.78 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:192.64.4.252" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "84.66.173.78", "serverIP": "60.187.249.13", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.187.249.13 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=84.66.173.78 spt=55053 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=84.66.173.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.187.249.13 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=84.66.173.78 spt=55053 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=84.66.173.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 55053 facilitycode: 23 facilitylabel: local7 fqdn: /bk localhostname: WAFirewall localstarttime: 1692477981446 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252'] vendorcode: 342 streamName: barracuda_waf clientIP: 84.66.173.78 serverIP: 60.187.249.13 userName: -
Explain this syslog message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.205.250.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=104.183.17.98 spt=54697 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.183.17.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 54697, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/bc", "localhostname": "WAFirewall", "localstarttime": "1692477981283 ", "message": "<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.205.250.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=104.183.17.98 spt=54697 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.183.17.98 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:192.64.4.252" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "104.183.17.98", "serverIP": "101.205.250.218", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.205.250.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=104.183.17.98 spt=54697 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.183.17.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.205.250.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=104.183.17.98 spt=54697 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.183.17.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 54697 facilitycode: 23 facilitylabel: local7 fqdn: /bc localhostname: WAFirewall localstarttime: 1692477981283 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252'] vendorcode: 342 streamName: barracuda_waf clientIP: 104.183.17.98 serverIP: 101.205.250.218 userName: -
Explain this syslog message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=63.115.117.184 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=76.135.181.211 spt=54697 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.135.181.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 54697, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/bc", "localhostname": "WAFirewall", "localstarttime": "1692477981283 ", "message": "<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=63.115.117.184 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=76.135.181.211 spt=54697 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.135.181.211 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:192.64.4.252" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "76.135.181.211", "serverIP": "63.115.117.184", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=63.115.117.184 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=76.135.181.211 spt=54697 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.135.181.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=63.115.117.184 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=76.135.181.211 spt=54697 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.135.181.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 54697 facilitycode: 23 facilitylabel: local7 fqdn: /bc localhostname: WAFirewall localstarttime: 1692477981283 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252'] vendorcode: 342 streamName: barracuda_waf clientIP: 76.135.181.211 serverIP: 63.115.117.184 userName: -
Explain this syslog message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.170.46.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=130.23.27.117 spt=55325 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.23.27.117 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 55325, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/backup", "localhostname": "WAFirewall", "localstarttime": "1692477981613 ", "message": "<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.170.46.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=130.23.27.117 spt=55325 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.23.27.117 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:192.64.4.252" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "130.23.27.117", "serverIP": "121.170.46.45", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.170.46.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=130.23.27.117 spt=55325 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.23.27.117 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.170.46.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=130.23.27.117 spt=55325 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.23.27.117 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 55325 facilitycode: 23 facilitylabel: local7 fqdn: /backup localhostname: WAFirewall localstarttime: 1692477981613 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252'] vendorcode: 342 streamName: barracuda_waf clientIP: 130.23.27.117 serverIP: 121.170.46.45 userName: -
Explain this syslog message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=116.128.223.94 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.17.188.250 spt=55325 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.17.188.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 55325, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/backup", "localhostname": "WAFirewall", "localstarttime": "1692477981613 ", "message": "<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=116.128.223.94 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=131.17.188.250 spt=55325 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.17.188.250 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:192.64.4.252" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "131.17.188.250", "serverIP": "116.128.223.94", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=116.128.223.94 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.17.188.250 spt=55325 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.17.188.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=116.128.223.94 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.17.188.250 spt=55325 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.17.188.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 55325 facilitycode: 23 facilitylabel: local7 fqdn: /backup localhostname: WAFirewall localstarttime: 1692477981613 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252'] vendorcode: 342 streamName: barracuda_waf clientIP: 131.17.188.250 serverIP: 116.128.223.94 userName: -
Explain this syslog message
<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.23.30.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=107.19.4.206 spt=55917 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=107.19.4.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 55917, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/main", "localhostname": "WAFirewall", "localstarttime": "1692477982077 ", "message": "<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.23.30.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=107.19.4.206 spt=55917 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=107.19.4.206 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:192.64.4.252" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "107.19.4.206", "serverIP": "134.23.30.128", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.23.30.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=107.19.4.206 spt=55917 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=107.19.4.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.23.30.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=107.19.4.206 spt=55917 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=107.19.4.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 55917 facilitycode: 23 facilitylabel: local7 fqdn: /main localhostname: WAFirewall localstarttime: 1692477982077 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252'] vendorcode: 342 streamName: barracuda_waf clientIP: 107.19.4.206 serverIP: 134.23.30.128 userName: -
Explain this syslog message
<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=167.186.143.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=5.214.163.149 spt=55917 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=5.214.163.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 55917, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/main", "localhostname": "WAFirewall", "localstarttime": "1692477982077 ", "message": "<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=167.186.143.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=5.214.163.149 spt=55917 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=5.214.163.149 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:192.64.4.252" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "5.214.163.149", "serverIP": "167.186.143.128", "userName": "-" }
Create a JSON artifact from the message
<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=167.186.143.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=5.214.163.149 spt=55917 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=5.214.163.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=167.186.143.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=5.214.163.149 spt=55917 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=5.214.163.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 55917 facilitycode: 23 facilitylabel: local7 fqdn: /main localhostname: WAFirewall localstarttime: 1692477982077 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252'] vendorcode: 342 streamName: barracuda_waf clientIP: 5.214.163.149 serverIP: 167.186.143.128 userName: -
Explain this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"112.127.166.198","externalIp":"181.33.253.17","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=112.127.166.198 ::: serverIP=181.33.253.17 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-15T11:53:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"112.127.166.198\",\"externalIp\":\"181.33.253.17\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-15T11:53:11.000Z\"} ::: clientIP=112.127.166.198 ::: serverIP=181.33.253.17 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "pocketfaucet.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "pocketfaucet.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "112.127.166.198", "serverIP": "181.33.253.17", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"112.127.166.198","externalIp":"181.33.253.17","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=112.127.166.198 ::: serverIP=181.33.253.17 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"112.127.166.198","externalIp":"181.33.253.17","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=112.127.166.198 ::: serverIP=181.33.253.17 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-15T11:53:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: pocketfaucet.com messagetype: firewall_action severitycode: 2 fqdn: pocketfaucet.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 112.127.166.198 serverIP: 181.33.253.17 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"177.211.159.14","externalIp":"73.237.98.168","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=177.211.159.14 ::: serverIP=73.237.98.168 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-15T11:53:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"177.211.159.14\",\"externalIp\":\"73.237.98.168\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-15T11:53:11.000Z\"} ::: clientIP=177.211.159.14 ::: serverIP=73.237.98.168 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "pocketfaucet.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "pocketfaucet.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "177.211.159.14", "serverIP": "73.237.98.168", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"177.211.159.14","externalIp":"73.237.98.168","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=177.211.159.14 ::: serverIP=73.237.98.168 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"177.211.159.14","externalIp":"73.237.98.168","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=177.211.159.14 ::: serverIP=73.237.98.168 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-15T11:53:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: pocketfaucet.com messagetype: firewall_action severitycode: 2 fqdn: pocketfaucet.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 177.211.159.14 serverIP: 73.237.98.168 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"46.46.137.64","externalIp":"56.249.219.91","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=46.46.137.64 ::: serverIP=56.249.219.91 ::: userName=johndoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-15T11:53:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"46.46.137.64\",\"externalIp\":\"56.249.219.91\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-15T11:53:11.000Z\"} ::: clientIP=46.46.137.64 ::: serverIP=56.249.219.91 ::: userName=johndoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "pocketfaucet.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "pocketfaucet.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "46.46.137.64", "serverIP": "56.249.219.91", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"46.46.137.64","externalIp":"56.249.219.91","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=46.46.137.64 ::: serverIP=56.249.219.91 ::: userName=johndoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"46.46.137.64","externalIp":"56.249.219.91","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=46.46.137.64 ::: serverIP=56.249.219.91 ::: userName=johndoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-15T11:53:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: pocketfaucet.com messagetype: firewall_action severitycode: 2 fqdn: pocketfaucet.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 46.46.137.64 serverIP: 56.249.219.91 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"58.237.208.180","externalIp":"251.225.192.112","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=58.237.208.180 ::: serverIP=251.225.192.112 ::: userName=charlie ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-15T11:53:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"58.237.208.180\",\"externalIp\":\"251.225.192.112\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-15T11:53:11.000Z\"} ::: clientIP=58.237.208.180 ::: serverIP=251.225.192.112 ::: userName=charlie ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "pocketfaucet.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "pocketfaucet.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "58.237.208.180", "serverIP": "251.225.192.112", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"58.237.208.180","externalIp":"251.225.192.112","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=58.237.208.180 ::: serverIP=251.225.192.112 ::: userName=charlie ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"58.237.208.180","externalIp":"251.225.192.112","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=58.237.208.180 ::: serverIP=251.225.192.112 ::: userName=charlie ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-15T11:53:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: pocketfaucet.com messagetype: firewall_action severitycode: 2 fqdn: pocketfaucet.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 58.237.208.180 serverIP: 251.225.192.112 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"158.239.43.47","externalIp":"54.206.27.117","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=158.239.43.47 ::: serverIP=54.206.27.117 ::: userName=fish ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-15T11:53:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"158.239.43.47\",\"externalIp\":\"54.206.27.117\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-15T11:53:11.000Z\"} ::: clientIP=158.239.43.47 ::: serverIP=54.206.27.117 ::: userName=fish ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "pocketfaucet.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "pocketfaucet.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "158.239.43.47", "serverIP": "54.206.27.117", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"158.239.43.47","externalIp":"54.206.27.117","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=158.239.43.47 ::: serverIP=54.206.27.117 ::: userName=fish ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"158.239.43.47","externalIp":"54.206.27.117","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=158.239.43.47 ::: serverIP=54.206.27.117 ::: userName=fish ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-15T11:53:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: pocketfaucet.com messagetype: firewall_action severitycode: 2 fqdn: pocketfaucet.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 158.239.43.47 serverIP: 54.206.27.117 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"120.143.228.194","externalIp":"107.170.43.218","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=120.143.228.194 ::: serverIP=107.170.43.218 ::: userName=janedoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-15T11:53:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"120.143.228.194\",\"externalIp\":\"107.170.43.218\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-15T11:53:11.000Z\"} ::: clientIP=120.143.228.194 ::: serverIP=107.170.43.218 ::: userName=janedoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "pocketfaucet.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "pocketfaucet.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "120.143.228.194", "serverIP": "107.170.43.218", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"120.143.228.194","externalIp":"107.170.43.218","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=120.143.228.194 ::: serverIP=107.170.43.218 ::: userName=janedoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"120.143.228.194","externalIp":"107.170.43.218","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=120.143.228.194 ::: serverIP=107.170.43.218 ::: userName=janedoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-15T11:53:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: pocketfaucet.com messagetype: firewall_action severitycode: 2 fqdn: pocketfaucet.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 120.143.228.194 serverIP: 107.170.43.218 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"98.11.241.126","externalIp":"98.11.241.126","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=98.11.241.126 ::: serverIP=98.11.241.126 ::: userName=alice ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-08T22:56:00.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={\"originId\":410614042,\"originType\":\"AD Users\",\"internalIp\":\"98.11.241.126\",\"externalIp\":\"98.11.241.126\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"imp.onesearch.org\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-08T22:56:00.000Z\"} ::: clientIP=98.11.241.126 ::: serverIP=98.11.241.126 ::: userName=alice ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "imp.onesearch.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "imp.onesearch.org", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "98.11.241.126", "serverIP": "98.140.172.19", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"98.11.241.126","externalIp":"98.11.241.126","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=98.11.241.126 ::: serverIP=98.11.241.126 ::: userName=alice ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"98.11.241.126","externalIp":"98.11.241.126","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=98.11.241.126 ::: serverIP=98.11.241.126 ::: userName=alice ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-08T22:56:00.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: imp.onesearch.org messagetype: firewall_action severitycode: 2 fqdn: imp.onesearch.org vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 98.11.241.126 serverIP: 98.140.172.19 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"162.41.227.74","externalIp":"162.41.227.74","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=162.41.227.74 ::: serverIP=162.41.227.74 ::: userName=janedoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-08T22:56:00.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={\"originId\":410614042,\"originType\":\"AD Users\",\"internalIp\":\"162.41.227.74\",\"externalIp\":\"162.41.227.74\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"imp.onesearch.org\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-08T22:56:00.000Z\"} ::: clientIP=162.41.227.74 ::: serverIP=162.41.227.74 ::: userName=janedoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "imp.onesearch.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "imp.onesearch.org", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "162.41.227.74", "serverIP": "238.52.64.182", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"162.41.227.74","externalIp":"162.41.227.74","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=162.41.227.74 ::: serverIP=162.41.227.74 ::: userName=janedoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"162.41.227.74","externalIp":"162.41.227.74","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=162.41.227.74 ::: serverIP=162.41.227.74 ::: userName=janedoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-08T22:56:00.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: imp.onesearch.org messagetype: firewall_action severitycode: 2 fqdn: imp.onesearch.org vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 162.41.227.74 serverIP: 238.52.64.182 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"228.159.33.15","externalIp":"228.159.33.15","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=228.159.33.15 ::: serverIP=228.159.33.15 ::: userName=johndoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-08T22:56:00.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={\"originId\":410614042,\"originType\":\"AD Users\",\"internalIp\":\"228.159.33.15\",\"externalIp\":\"228.159.33.15\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"imp.onesearch.org\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-08T22:56:00.000Z\"} ::: clientIP=228.159.33.15 ::: serverIP=228.159.33.15 ::: userName=johndoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "imp.onesearch.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "imp.onesearch.org", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "228.159.33.15", "serverIP": "171.223.178.195", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"228.159.33.15","externalIp":"228.159.33.15","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=228.159.33.15 ::: serverIP=228.159.33.15 ::: userName=johndoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"228.159.33.15","externalIp":"228.159.33.15","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=228.159.33.15 ::: serverIP=228.159.33.15 ::: userName=johndoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-08T22:56:00.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: imp.onesearch.org messagetype: firewall_action severitycode: 2 fqdn: imp.onesearch.org vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 228.159.33.15 serverIP: 171.223.178.195 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"188.248.211.232","externalIp":"188.248.211.232","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=188.248.211.232 ::: serverIP=188.248.211.232 ::: userName=bob ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-08T22:56:00.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={\"originId\":410614042,\"originType\":\"AD Users\",\"internalIp\":\"188.248.211.232\",\"externalIp\":\"188.248.211.232\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"imp.onesearch.org\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-08T22:56:00.000Z\"} ::: clientIP=188.248.211.232 ::: serverIP=188.248.211.232 ::: userName=bob ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "imp.onesearch.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "imp.onesearch.org", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "188.248.211.232", "serverIP": "111.117.135.46", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"188.248.211.232","externalIp":"188.248.211.232","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=188.248.211.232 ::: serverIP=188.248.211.232 ::: userName=bob ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"188.248.211.232","externalIp":"188.248.211.232","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=188.248.211.232 ::: serverIP=188.248.211.232 ::: userName=bob ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-08T22:56:00.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: imp.onesearch.org messagetype: firewall_action severitycode: 2 fqdn: imp.onesearch.org vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 188.248.211.232 serverIP: 111.117.135.46 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"210.142.170.159","externalIp":"190.221.195.62","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=210.142.170.159 ::: serverIP=190.221.195.62 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T17:15:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"210.142.170.159\",\"externalIp\":\"190.221.195.62\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=210.142.170.159 ::: serverIP=190.221.195.62 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "210.142.170.159", "serverIP": "190.221.195.62", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"210.142.170.159","externalIp":"190.221.195.62","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=210.142.170.159 ::: serverIP=190.221.195.62 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"210.142.170.159","externalIp":"190.221.195.62","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=210.142.170.159 ::: serverIP=190.221.195.62 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T17:15:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 210.142.170.159 serverIP: 190.221.195.62 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"135.38.79.212","externalIp":"193.92.246.20","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=135.38.79.212 ::: serverIP=193.92.246.20 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T17:15:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"135.38.79.212\",\"externalIp\":\"193.92.246.20\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=135.38.79.212 ::: serverIP=193.92.246.20 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "135.38.79.212", "serverIP": "193.92.246.20", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"135.38.79.212","externalIp":"193.92.246.20","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=135.38.79.212 ::: serverIP=193.92.246.20 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"135.38.79.212","externalIp":"193.92.246.20","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=135.38.79.212 ::: serverIP=193.92.246.20 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T17:15:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 135.38.79.212 serverIP: 193.92.246.20 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"250.150.25.158","externalIp":"185.227.90.155","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=250.150.25.158 ::: serverIP=185.227.90.155 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T17:15:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"250.150.25.158\",\"externalIp\":\"185.227.90.155\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=250.150.25.158 ::: serverIP=185.227.90.155 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "250.150.25.158", "serverIP": "185.227.90.155", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"250.150.25.158","externalIp":"185.227.90.155","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=250.150.25.158 ::: serverIP=185.227.90.155 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"250.150.25.158","externalIp":"185.227.90.155","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=250.150.25.158 ::: serverIP=185.227.90.155 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T17:15:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 250.150.25.158 serverIP: 185.227.90.155 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"135.3.255.88","externalIp":"113.216.174.131","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=135.3.255.88 ::: serverIP=113.216.174.131 ::: userName=fish ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T17:15:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"135.3.255.88\",\"externalIp\":\"113.216.174.131\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=135.3.255.88 ::: serverIP=113.216.174.131 ::: userName=fish ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "135.3.255.88", "serverIP": "113.216.174.131", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"135.3.255.88","externalIp":"113.216.174.131","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=135.3.255.88 ::: serverIP=113.216.174.131 ::: userName=fish ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"135.3.255.88","externalIp":"113.216.174.131","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=135.3.255.88 ::: serverIP=113.216.174.131 ::: userName=fish ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T17:15:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 135.3.255.88 serverIP: 113.216.174.131 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"200.38.200.85","externalIp":"203.1.208.49","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=200.38.200.85 ::: serverIP=203.1.208.49 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T16:55:32.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535533968,\"originType\":\"Network Devices\",\"internalIp\":\"200.38.200.85\",\"externalIp\":\"203.1.208.49\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:32.000Z\"} ::: clientIP=200.38.200.85 ::: serverIP=203.1.208.49 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "200.38.200.85", "serverIP": "203.1.208.49", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"200.38.200.85","externalIp":"203.1.208.49","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=200.38.200.85 ::: serverIP=203.1.208.49 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message