input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Aug 19 22:35:52 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=206.245.215.111 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=66.153.181.57 spt=47932 requestMethod=GET app=HTTP requestContext="-" start=Aug 19 2022 22:35:52 rt=1660966552509 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182b95243bd-e2f78f2b cn2=47932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=66.153.181.57 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 22:35:52 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=206.245.215.111 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=66.153.181.57 spt=47932 requestMethod=GET app=HTTP requestContext="-" start=Aug 19 2022 22:35:52 rt=1660966552509 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 " dvchost=WAFirewall externalId=182b95243bd-e2f78f2b cn2=47932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=66.153.181.57 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:193.118.53.210', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1660966552509
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 47932
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 66.153.181.57
serverIP: 206.245.215.111
userName: - | Explain this syslog message |
WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"20.147.245.112","externalIp":"44.151.78.229","categories":["Malware","Not Actionable"],"tags":[],"destination":"captchasafe.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-15T18:14:50.000Z"} ::: clientIP=20.147.245.112 ::: serverIP=44.151.78.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "captchasafe.top",
"message": "WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"20.147.245.112\",\"externalIp\":\"44.151.78.229\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captchasafe.top\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T18:14:50.000Z\"} ::: clientIP=20.147.245.112 ::: serverIP=44.151.78.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "captchasafe.top",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-15T18:14:50.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "20.147.245.112",
"serverIP": "44.151.78.229",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"20.147.245.112","externalIp":"44.151.78.229","categories":["Malware","Not Actionable"],"tags":[],"destination":"captchasafe.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-15T18:14:50.000Z"} ::: clientIP=20.147.245.112 ::: serverIP=44.151.78.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"20.147.245.112","externalIp":"44.151.78.229","categories":["Malware","Not Actionable"],"tags":[],"destination":"captchasafe.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-15T18:14:50.000Z"} ::: clientIP=20.147.245.112 ::: serverIP=44.151.78.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: captchasafe.top
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: captchasafe.top
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-15T18:14:50.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 20.147.245.112
serverIP: 44.151.78.229
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"53.119.120.116","externalIp":"213.148.33.229","categories":["Malware","Not Actionable"],"tags":[],"destination":"captchasafe.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-15T18:14:50.000Z"} ::: clientIP=53.119.120.116 ::: serverIP=213.148.33.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "captchasafe.top",
"message": "WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"53.119.120.116\",\"externalIp\":\"213.148.33.229\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captchasafe.top\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-15T18:14:50.000Z\"} ::: clientIP=53.119.120.116 ::: serverIP=213.148.33.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "captchasafe.top",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-15T18:14:50.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "53.119.120.116",
"serverIP": "213.148.33.229",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"53.119.120.116","externalIp":"213.148.33.229","categories":["Malware","Not Actionable"],"tags":[],"destination":"captchasafe.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-15T18:14:50.000Z"} ::: clientIP=53.119.120.116 ::: serverIP=213.148.33.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=captchasafe.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"53.119.120.116","externalIp":"213.148.33.229","categories":["Malware","Not Actionable"],"tags":[],"destination":"captchasafe.top","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-15T18:14:50.000Z"} ::: clientIP=53.119.120.116 ::: serverIP=213.148.33.229 ::: userName=nighthawk ::: created_at=2023-05-15T18:14:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-15T18:14:50.000Z ::: serverHostname=captchasafe.top ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: captchasafe.top
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: captchasafe.top
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-15T18:14:50.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 53.119.120.116
serverIP: 213.148.33.229
userName: nighthawk | Explain this syslog message |
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=219.245.56.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.97.153.30 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.97.153.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:114.119.131.195",
"rfc3164"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=219.245.56.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=184.97.153.30 spt=57889 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.97.153.30 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1665786115842 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/robots.txt",
"clientport": 57889,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "184.97.153.30",
"serverIP": "219.245.56.52",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=219.245.56.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.97.153.30 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.97.153.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=219.245.56.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=184.97.153.30 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=184.97.153.30 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:114.119.131.195', 'rfc3164']
productids: [0]
sourceinfo: unknown
localstarttime: 1665786115842
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /robots.txt
clientport: 57889
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 184.97.153.30
serverIP: 219.245.56.52
userName: - | Explain this syslog message |
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=222.87.199.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=88.229.87.235 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.229.87.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:114.119.131.195",
"rfc3164"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=222.87.199.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=88.229.87.235 spt=57889 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.229.87.235 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1665786115842 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/robots.txt",
"clientport": 57889,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "88.229.87.235",
"serverIP": "222.87.199.33",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=222.87.199.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=88.229.87.235 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.229.87.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=222.87.199.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=88.229.87.235 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=88.229.87.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:114.119.131.195', 'rfc3164']
productids: [0]
sourceinfo: unknown
localstarttime: 1665786115842
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /robots.txt
clientport: 57889
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 88.229.87.235
serverIP: 222.87.199.33
userName: - | Explain this syslog message |
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=202.200.30.31 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=185.224.218.209 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.224.218.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:114.119.131.195",
"rfc3164"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=202.200.30.31 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=185.224.218.209 spt=57889 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.224.218.209 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1665786115842 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/robots.txt",
"clientport": 57889,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "185.224.218.209",
"serverIP": "202.200.30.31",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=202.200.30.31 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=185.224.218.209 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.224.218.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 14 17:21:55 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=202.200.30.31 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=185.224.218.209 spt=57889 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 14 2022 17:21:55 rt=1665786115842 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183d896f6c1-3d7a0fa cn2=57889 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.224.218.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:114.119.131.195', 'rfc3164']
productids: [0]
sourceinfo: unknown
localstarttime: 1665786115842
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /robots.txt
clientport: 57889
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 185.224.218.209
serverIP: 202.200.30.31
userName: - | Explain this syslog message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=245.128.111.155 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=59.24.42.196 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.24.42.196 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53281,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1692477980949 ",
"message": "<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=245.128.111.155 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=59.24.42.196 spt=53281 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.24.42.196 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:192.64.4.252"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "59.24.42.196",
"serverIP": "245.128.111.155",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=245.128.111.155 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=59.24.42.196 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.24.42.196 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=245.128.111.155 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=59.24.42.196 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=59.24.42.196 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53281
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1692477980949
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252']
vendorcode: 342
streamName: barracuda_waf
clientIP: 59.24.42.196
serverIP: 245.128.111.155
userName: - | Explain this syslog message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.242.214.46 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=8.133.32.192 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.133.32.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53281,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1692477980949 ",
"message": "<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.242.214.46 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=8.133.32.192 spt=53281 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.133.32.192 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:192.64.4.252"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "8.133.32.192",
"serverIP": "254.242.214.46",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.242.214.46 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=8.133.32.192 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.133.32.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.242.214.46 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=8.133.32.192 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.133.32.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53281
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1692477980949
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252']
vendorcode: 342
streamName: barracuda_waf
clientIP: 8.133.32.192
serverIP: 254.242.214.46
userName: - | Explain this syslog message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=160.236.151.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.41.144.224 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.41.144.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53281,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1692477980949 ",
"message": "<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=160.236.151.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=151.41.144.224 spt=53281 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.41.144.224 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:192.64.4.252"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "151.41.144.224",
"serverIP": "160.236.151.137",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=160.236.151.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.41.144.224 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.41.144.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=160.236.151.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.41.144.224 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.41.144.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53281
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1692477980949
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252']
vendorcode: 342
streamName: barracuda_waf
clientIP: 151.41.144.224
serverIP: 160.236.151.137
userName: - | Explain this syslog message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=14.126.1.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.9.189.201 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.9.189.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53281,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1692477980949 ",
"message": "<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=14.126.1.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=10.9.189.201 spt=53281 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.9.189.201 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:192.64.4.252"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "10.9.189.201",
"serverIP": "14.126.1.204",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=14.126.1.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.9.189.201 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.9.189.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=14.126.1.204 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=10.9.189.201 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.9.189.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53281
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1692477980949
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252']
vendorcode: 342
streamName: barracuda_waf
clientIP: 10.9.189.201
serverIP: 14.126.1.204
userName: - | Explain this syslog message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.191.160.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=48.15.166.218 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=48.15.166.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53281,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1692477980949 ",
"message": "<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.191.160.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=48.15.166.218 spt=53281 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=48.15.166.218 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:192.64.4.252"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "48.15.166.218",
"serverIP": "254.191.160.89",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.191.160.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=48.15.166.218 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=48.15.166.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 15:46:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.191.160.89 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=48.15.166.218 spt=53281 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:20 rt=1692477980949 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8115-b9694355 cn2=53281 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=48.15.166.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53281
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1692477980949
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252']
vendorcode: 342
streamName: barracuda_waf
clientIP: 48.15.166.218
serverIP: 254.191.160.89
userName: - | Explain this syslog message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.94.63.118 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.115.216.46 spt=55053 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.115.216.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55053,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/bk",
"localhostname": "WAFirewall",
"localstarttime": "1692477981446 ",
"message": "<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.94.63.118 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=93.115.216.46 spt=55053 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.115.216.46 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:192.64.4.252"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "93.115.216.46",
"serverIP": "247.94.63.118",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.94.63.118 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.115.216.46 spt=55053 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.115.216.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=247.94.63.118 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=93.115.216.46 spt=55053 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=93.115.216.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55053
facilitycode: 23
facilitylabel: local7
fqdn: /bk
localhostname: WAFirewall
localstarttime: 1692477981446
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252']
vendorcode: 342
streamName: barracuda_waf
clientIP: 93.115.216.46
serverIP: 247.94.63.118
userName: - | Explain this syslog message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.187.249.13 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=84.66.173.78 spt=55053 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=84.66.173.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55053,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/bk",
"localhostname": "WAFirewall",
"localstarttime": "1692477981446 ",
"message": "<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.187.249.13 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=84.66.173.78 spt=55053 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=84.66.173.78 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:192.64.4.252"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "84.66.173.78",
"serverIP": "60.187.249.13",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.187.249.13 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=84.66.173.78 spt=55053 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=84.66.173.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.187.249.13 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=84.66.173.78 spt=55053 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981446 request=/bk requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8306-b3650e38 cn2=55053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=84.66.173.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55053
facilitycode: 23
facilitylabel: local7
fqdn: /bk
localhostname: WAFirewall
localstarttime: 1692477981446
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252']
vendorcode: 342
streamName: barracuda_waf
clientIP: 84.66.173.78
serverIP: 60.187.249.13
userName: - | Explain this syslog message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.205.250.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=104.183.17.98 spt=54697 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.183.17.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54697,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/bc",
"localhostname": "WAFirewall",
"localstarttime": "1692477981283 ",
"message": "<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.205.250.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=104.183.17.98 spt=54697 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.183.17.98 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:192.64.4.252"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "104.183.17.98",
"serverIP": "101.205.250.218",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.205.250.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=104.183.17.98 spt=54697 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.183.17.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=101.205.250.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=104.183.17.98 spt=54697 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=104.183.17.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54697
facilitycode: 23
facilitylabel: local7
fqdn: /bc
localhostname: WAFirewall
localstarttime: 1692477981283
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252']
vendorcode: 342
streamName: barracuda_waf
clientIP: 104.183.17.98
serverIP: 101.205.250.218
userName: - | Explain this syslog message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=63.115.117.184 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=76.135.181.211 spt=54697 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.135.181.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54697,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/bc",
"localhostname": "WAFirewall",
"localstarttime": "1692477981283 ",
"message": "<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=63.115.117.184 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=76.135.181.211 spt=54697 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.135.181.211 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:192.64.4.252"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "76.135.181.211",
"serverIP": "63.115.117.184",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=63.115.117.184 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=76.135.181.211 spt=54697 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.135.181.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=63.115.117.184 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=76.135.181.211 spt=54697 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981283 request=/bc requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c8263-b59de7e7 cn2=54697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=76.135.181.211 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54697
facilitycode: 23
facilitylabel: local7
fqdn: /bc
localhostname: WAFirewall
localstarttime: 1692477981283
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252']
vendorcode: 342
streamName: barracuda_waf
clientIP: 76.135.181.211
serverIP: 63.115.117.184
userName: - | Explain this syslog message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.170.46.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=130.23.27.117 spt=55325 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.23.27.117 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55325,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/backup",
"localhostname": "WAFirewall",
"localstarttime": "1692477981613 ",
"message": "<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.170.46.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=130.23.27.117 spt=55325 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.23.27.117 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:192.64.4.252"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "130.23.27.117",
"serverIP": "121.170.46.45",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.170.46.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=130.23.27.117 spt=55325 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.23.27.117 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.170.46.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=130.23.27.117 spt=55325 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=130.23.27.117 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55325
facilitycode: 23
facilitylabel: local7
fqdn: /backup
localhostname: WAFirewall
localstarttime: 1692477981613
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252']
vendorcode: 342
streamName: barracuda_waf
clientIP: 130.23.27.117
serverIP: 121.170.46.45
userName: - | Explain this syslog message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=116.128.223.94 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.17.188.250 spt=55325 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.17.188.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55325,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/backup",
"localhostname": "WAFirewall",
"localstarttime": "1692477981613 ",
"message": "<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=116.128.223.94 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=131.17.188.250 spt=55325 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.17.188.250 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:192.64.4.252"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "131.17.188.250",
"serverIP": "116.128.223.94",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=116.128.223.94 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.17.188.250 spt=55325 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.17.188.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 15:46:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=116.128.223.94 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.17.188.250 spt=55325 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:21 rt=1692477981613 request=/backup requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c83ad-e45d4deb cn2=55325 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.17.188.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55325
facilitycode: 23
facilitylabel: local7
fqdn: /backup
localhostname: WAFirewall
localstarttime: 1692477981613
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252']
vendorcode: 342
streamName: barracuda_waf
clientIP: 131.17.188.250
serverIP: 116.128.223.94
userName: - | Explain this syslog message |
<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.23.30.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=107.19.4.206 spt=55917 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=107.19.4.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55917,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/main",
"localhostname": "WAFirewall",
"localstarttime": "1692477982077 ",
"message": "<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.23.30.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=107.19.4.206 spt=55917 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=107.19.4.206 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:192.64.4.252"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "107.19.4.206",
"serverIP": "134.23.30.128",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.23.30.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=107.19.4.206 spt=55917 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=107.19.4.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=134.23.30.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=107.19.4.206 spt=55917 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=107.19.4.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55917
facilitycode: 23
facilitylabel: local7
fqdn: /main
localhostname: WAFirewall
localstarttime: 1692477982077
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252']
vendorcode: 342
streamName: barracuda_waf
clientIP: 107.19.4.206
serverIP: 134.23.30.128
userName: - | Explain this syslog message |
<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=167.186.143.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=5.214.163.149 spt=55917 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=5.214.163.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55917,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/main",
"localhostname": "WAFirewall",
"localstarttime": "1692477982077 ",
"message": "<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=167.186.143.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=5.214.163.149 spt=55917 requestMethod=HEAD app=HTTP requestContext=\"-\" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36\" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=5.214.163.149 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:192.64.4.252"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "5.214.163.149",
"serverIP": "167.186.143.128",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=167.186.143.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=5.214.163.149 spt=55917 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=5.214.163.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 19 15:46:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=167.186.143.128 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=5.214.163.149 spt=55917 requestMethod=HEAD app=HTTP requestContext="-" start=Aug 19 2023 15:46:22 rt=1692477982077 request=/main requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" dvchost=WAFirewall externalId=18a0f8c857c-d897d9a6 cn2=55917 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=5.214.163.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55917
facilitycode: 23
facilitylabel: local7
fqdn: /main
localhostname: WAFirewall
localstarttime: 1692477982077
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:192.64.4.252']
vendorcode: 342
streamName: barracuda_waf
clientIP: 5.214.163.149
serverIP: 167.186.143.128
userName: - | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"112.127.166.198","externalIp":"181.33.253.17","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=112.127.166.198 ::: serverIP=181.33.253.17 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-15T11:53:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"112.127.166.198\",\"externalIp\":\"181.33.253.17\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-15T11:53:11.000Z\"} ::: clientIP=112.127.166.198 ::: serverIP=181.33.253.17 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "pocketfaucet.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "pocketfaucet.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "112.127.166.198",
"serverIP": "181.33.253.17",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"112.127.166.198","externalIp":"181.33.253.17","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=112.127.166.198 ::: serverIP=181.33.253.17 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"112.127.166.198","externalIp":"181.33.253.17","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=112.127.166.198 ::: serverIP=181.33.253.17 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-15T11:53:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: pocketfaucet.com
messagetype: firewall_action
severitycode: 2
fqdn: pocketfaucet.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 112.127.166.198
serverIP: 181.33.253.17
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"177.211.159.14","externalIp":"73.237.98.168","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=177.211.159.14 ::: serverIP=73.237.98.168 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-15T11:53:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"177.211.159.14\",\"externalIp\":\"73.237.98.168\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-15T11:53:11.000Z\"} ::: clientIP=177.211.159.14 ::: serverIP=73.237.98.168 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "pocketfaucet.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "pocketfaucet.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "177.211.159.14",
"serverIP": "73.237.98.168",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"177.211.159.14","externalIp":"73.237.98.168","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=177.211.159.14 ::: serverIP=73.237.98.168 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"177.211.159.14","externalIp":"73.237.98.168","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=177.211.159.14 ::: serverIP=73.237.98.168 ::: userName=alice ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-15T11:53:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: pocketfaucet.com
messagetype: firewall_action
severitycode: 2
fqdn: pocketfaucet.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 177.211.159.14
serverIP: 73.237.98.168
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"46.46.137.64","externalIp":"56.249.219.91","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=46.46.137.64 ::: serverIP=56.249.219.91 ::: userName=johndoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-15T11:53:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"46.46.137.64\",\"externalIp\":\"56.249.219.91\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-15T11:53:11.000Z\"} ::: clientIP=46.46.137.64 ::: serverIP=56.249.219.91 ::: userName=johndoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "pocketfaucet.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "pocketfaucet.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "46.46.137.64",
"serverIP": "56.249.219.91",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"46.46.137.64","externalIp":"56.249.219.91","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=46.46.137.64 ::: serverIP=56.249.219.91 ::: userName=johndoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"46.46.137.64","externalIp":"56.249.219.91","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=46.46.137.64 ::: serverIP=56.249.219.91 ::: userName=johndoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-15T11:53:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: pocketfaucet.com
messagetype: firewall_action
severitycode: 2
fqdn: pocketfaucet.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 46.46.137.64
serverIP: 56.249.219.91
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"58.237.208.180","externalIp":"251.225.192.112","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=58.237.208.180 ::: serverIP=251.225.192.112 ::: userName=charlie ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-15T11:53:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"58.237.208.180\",\"externalIp\":\"251.225.192.112\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-15T11:53:11.000Z\"} ::: clientIP=58.237.208.180 ::: serverIP=251.225.192.112 ::: userName=charlie ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "pocketfaucet.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "pocketfaucet.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "58.237.208.180",
"serverIP": "251.225.192.112",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"58.237.208.180","externalIp":"251.225.192.112","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=58.237.208.180 ::: serverIP=251.225.192.112 ::: userName=charlie ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"58.237.208.180","externalIp":"251.225.192.112","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=58.237.208.180 ::: serverIP=251.225.192.112 ::: userName=charlie ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-15T11:53:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: pocketfaucet.com
messagetype: firewall_action
severitycode: 2
fqdn: pocketfaucet.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 58.237.208.180
serverIP: 251.225.192.112
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"158.239.43.47","externalIp":"54.206.27.117","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=158.239.43.47 ::: serverIP=54.206.27.117 ::: userName=fish ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-15T11:53:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"158.239.43.47\",\"externalIp\":\"54.206.27.117\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-15T11:53:11.000Z\"} ::: clientIP=158.239.43.47 ::: serverIP=54.206.27.117 ::: userName=fish ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "pocketfaucet.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "pocketfaucet.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "158.239.43.47",
"serverIP": "54.206.27.117",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"158.239.43.47","externalIp":"54.206.27.117","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=158.239.43.47 ::: serverIP=54.206.27.117 ::: userName=fish ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"158.239.43.47","externalIp":"54.206.27.117","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=158.239.43.47 ::: serverIP=54.206.27.117 ::: userName=fish ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-15T11:53:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: pocketfaucet.com
messagetype: firewall_action
severitycode: 2
fqdn: pocketfaucet.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 158.239.43.47
serverIP: 54.206.27.117
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"120.143.228.194","externalIp":"107.170.43.218","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=120.143.228.194 ::: serverIP=107.170.43.218 ::: userName=janedoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-15T11:53:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"120.143.228.194\",\"externalIp\":\"107.170.43.218\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-15T11:53:11.000Z\"} ::: clientIP=120.143.228.194 ::: serverIP=107.170.43.218 ::: userName=janedoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "pocketfaucet.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "pocketfaucet.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "120.143.228.194",
"serverIP": "107.170.43.218",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"120.143.228.194","externalIp":"107.170.43.218","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=120.143.228.194 ::: serverIP=107.170.43.218 ::: userName=janedoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"120.143.228.194","externalIp":"107.170.43.218","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-15T11:53:11.000Z"} ::: clientIP=120.143.228.194 ::: serverIP=107.170.43.218 ::: userName=janedoe ::: created_at=2022-07-15T11:53:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-15T11:53:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-15T11:53:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: pocketfaucet.com
messagetype: firewall_action
severitycode: 2
fqdn: pocketfaucet.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 120.143.228.194
serverIP: 107.170.43.218
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"98.11.241.126","externalIp":"98.11.241.126","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=98.11.241.126 ::: serverIP=98.11.241.126 ::: userName=alice ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-08T22:56:00.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={\"originId\":410614042,\"originType\":\"AD Users\",\"internalIp\":\"98.11.241.126\",\"externalIp\":\"98.11.241.126\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"imp.onesearch.org\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-08T22:56:00.000Z\"} ::: clientIP=98.11.241.126 ::: serverIP=98.11.241.126 ::: userName=alice ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "imp.onesearch.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "imp.onesearch.org",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "98.11.241.126",
"serverIP": "98.140.172.19",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"98.11.241.126","externalIp":"98.11.241.126","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=98.11.241.126 ::: serverIP=98.11.241.126 ::: userName=alice ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"98.11.241.126","externalIp":"98.11.241.126","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=98.11.241.126 ::: serverIP=98.11.241.126 ::: userName=alice ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-08T22:56:00.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: imp.onesearch.org
messagetype: firewall_action
severitycode: 2
fqdn: imp.onesearch.org
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 98.11.241.126
serverIP: 98.140.172.19
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"162.41.227.74","externalIp":"162.41.227.74","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=162.41.227.74 ::: serverIP=162.41.227.74 ::: userName=janedoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-08T22:56:00.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={\"originId\":410614042,\"originType\":\"AD Users\",\"internalIp\":\"162.41.227.74\",\"externalIp\":\"162.41.227.74\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"imp.onesearch.org\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-08T22:56:00.000Z\"} ::: clientIP=162.41.227.74 ::: serverIP=162.41.227.74 ::: userName=janedoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "imp.onesearch.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "imp.onesearch.org",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "162.41.227.74",
"serverIP": "238.52.64.182",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"162.41.227.74","externalIp":"162.41.227.74","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=162.41.227.74 ::: serverIP=162.41.227.74 ::: userName=janedoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"162.41.227.74","externalIp":"162.41.227.74","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=162.41.227.74 ::: serverIP=162.41.227.74 ::: userName=janedoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-08T22:56:00.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: imp.onesearch.org
messagetype: firewall_action
severitycode: 2
fqdn: imp.onesearch.org
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 162.41.227.74
serverIP: 238.52.64.182
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"228.159.33.15","externalIp":"228.159.33.15","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=228.159.33.15 ::: serverIP=228.159.33.15 ::: userName=johndoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-08T22:56:00.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={\"originId\":410614042,\"originType\":\"AD Users\",\"internalIp\":\"228.159.33.15\",\"externalIp\":\"228.159.33.15\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"imp.onesearch.org\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-08T22:56:00.000Z\"} ::: clientIP=228.159.33.15 ::: serverIP=228.159.33.15 ::: userName=johndoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "imp.onesearch.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "imp.onesearch.org",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "228.159.33.15",
"serverIP": "171.223.178.195",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"228.159.33.15","externalIp":"228.159.33.15","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=228.159.33.15 ::: serverIP=228.159.33.15 ::: userName=johndoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"228.159.33.15","externalIp":"228.159.33.15","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=228.159.33.15 ::: serverIP=228.159.33.15 ::: userName=johndoe ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-08T22:56:00.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: imp.onesearch.org
messagetype: firewall_action
severitycode: 2
fqdn: imp.onesearch.org
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 228.159.33.15
serverIP: 171.223.178.195
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"188.248.211.232","externalIp":"188.248.211.232","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=188.248.211.232 ::: serverIP=188.248.211.232 ::: userName=bob ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-08T22:56:00.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={\"originId\":410614042,\"originType\":\"AD Users\",\"internalIp\":\"188.248.211.232\",\"externalIp\":\"188.248.211.232\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"imp.onesearch.org\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-08T22:56:00.000Z\"} ::: clientIP=188.248.211.232 ::: serverIP=188.248.211.232 ::: userName=bob ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "imp.onesearch.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "imp.onesearch.org",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "188.248.211.232",
"serverIP": "111.117.135.46",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"188.248.211.232","externalIp":"188.248.211.232","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=188.248.211.232 ::: serverIP=188.248.211.232 ::: userName=bob ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614042,"originType":"AD Users","internalIp":"188.248.211.232","externalIp":"188.248.211.232","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-08T22:56:00.000Z"} ::: clientIP=188.248.211.232 ::: serverIP=188.248.211.232 ::: userName=bob ::: created_at=2022-06-08T22:56:00.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-08T22:56:00.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-08T22:56:00.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: imp.onesearch.org
messagetype: firewall_action
severitycode: 2
fqdn: imp.onesearch.org
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 188.248.211.232
serverIP: 111.117.135.46
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"210.142.170.159","externalIp":"190.221.195.62","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=210.142.170.159 ::: serverIP=190.221.195.62 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T17:15:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"210.142.170.159\",\"externalIp\":\"190.221.195.62\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=210.142.170.159 ::: serverIP=190.221.195.62 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "210.142.170.159",
"serverIP": "190.221.195.62",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"210.142.170.159","externalIp":"190.221.195.62","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=210.142.170.159 ::: serverIP=190.221.195.62 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"210.142.170.159","externalIp":"190.221.195.62","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=210.142.170.159 ::: serverIP=190.221.195.62 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T17:15:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 210.142.170.159
serverIP: 190.221.195.62
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"135.38.79.212","externalIp":"193.92.246.20","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=135.38.79.212 ::: serverIP=193.92.246.20 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T17:15:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"135.38.79.212\",\"externalIp\":\"193.92.246.20\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=135.38.79.212 ::: serverIP=193.92.246.20 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "135.38.79.212",
"serverIP": "193.92.246.20",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"135.38.79.212","externalIp":"193.92.246.20","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=135.38.79.212 ::: serverIP=193.92.246.20 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"135.38.79.212","externalIp":"193.92.246.20","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=135.38.79.212 ::: serverIP=193.92.246.20 ::: userName=alice ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T17:15:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 135.38.79.212
serverIP: 193.92.246.20
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"250.150.25.158","externalIp":"185.227.90.155","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=250.150.25.158 ::: serverIP=185.227.90.155 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T17:15:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"250.150.25.158\",\"externalIp\":\"185.227.90.155\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=250.150.25.158 ::: serverIP=185.227.90.155 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "250.150.25.158",
"serverIP": "185.227.90.155",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"250.150.25.158","externalIp":"185.227.90.155","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=250.150.25.158 ::: serverIP=185.227.90.155 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"250.150.25.158","externalIp":"185.227.90.155","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=250.150.25.158 ::: serverIP=185.227.90.155 ::: userName=charlie ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T17:15:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 250.150.25.158
serverIP: 185.227.90.155
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"135.3.255.88","externalIp":"113.216.174.131","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=135.3.255.88 ::: serverIP=113.216.174.131 ::: userName=fish ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T17:15:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"135.3.255.88\",\"externalIp\":\"113.216.174.131\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=135.3.255.88 ::: serverIP=113.216.174.131 ::: userName=fish ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "135.3.255.88",
"serverIP": "113.216.174.131",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"135.3.255.88","externalIp":"113.216.174.131","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=135.3.255.88 ::: serverIP=113.216.174.131 ::: userName=fish ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"135.3.255.88","externalIp":"113.216.174.131","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=135.3.255.88 ::: serverIP=113.216.174.131 ::: userName=fish ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T17:15:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 135.3.255.88
serverIP: 113.216.174.131
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"200.38.200.85","externalIp":"203.1.208.49","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=200.38.200.85 ::: serverIP=203.1.208.49 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:32.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535533968,\"originType\":\"Network Devices\",\"internalIp\":\"200.38.200.85\",\"externalIp\":\"203.1.208.49\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:32.000Z\"} ::: clientIP=200.38.200.85 ::: serverIP=203.1.208.49 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "200.38.200.85",
"serverIP": "203.1.208.49",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"200.38.200.85","externalIp":"203.1.208.49","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=200.38.200.85 ::: serverIP=203.1.208.49 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.