input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"122.184.55.21","externalIp":"107.118.204.201","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=122.184.55.21 ::: serverIP=107.118.204.201 ::: userName=charlie ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-09T16:28:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 122.184.55.21
serverIP: 107.118.204.201
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"220.3.199.102","externalIp":"7.22.171.85","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=220.3.199.102 ::: serverIP=7.22.171.85 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"220.3.199.102\",\"externalIp\":\"7.22.171.85\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-09T16:28:18.000Z\"} ::: clientIP=220.3.199.102 ::: serverIP=7.22.171.85 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-09T16:28:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "220.3.199.102",
"serverIP": "7.22.171.85",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"220.3.199.102","externalIp":"7.22.171.85","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=220.3.199.102 ::: serverIP=7.22.171.85 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"220.3.199.102","externalIp":"7.22.171.85","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=220.3.199.102 ::: serverIP=7.22.171.85 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-09T16:28:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 220.3.199.102
serverIP: 7.22.171.85
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"108.85.3.253","externalIp":"144.69.138.115","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=108.85.3.253 ::: serverIP=144.69.138.115 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"108.85.3.253\",\"externalIp\":\"144.69.138.115\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-09T16:28:18.000Z\"} ::: clientIP=108.85.3.253 ::: serverIP=144.69.138.115 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-09T16:28:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "108.85.3.253",
"serverIP": "144.69.138.115",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"108.85.3.253","externalIp":"144.69.138.115","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=108.85.3.253 ::: serverIP=144.69.138.115 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"108.85.3.253","externalIp":"144.69.138.115","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=108.85.3.253 ::: serverIP=144.69.138.115 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-09T16:28:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 108.85.3.253
serverIP: 144.69.138.115
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"28.168.133.199","externalIp":"134.170.218.221","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=28.168.133.199 ::: serverIP=134.170.218.221 ::: userName=johndoe ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "pushclk-10416.com",
"message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"28.168.133.199\",\"externalIp\":\"134.170.218.221\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-09T16:28:18.000Z\"} ::: clientIP=28.168.133.199 ::: serverIP=134.170.218.221 ::: userName=johndoe ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "pushclk-10416.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-09T16:28:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsMalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "28.168.133.199",
"serverIP": "134.170.218.221",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"28.168.133.199","externalIp":"134.170.218.221","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=28.168.133.199 ::: serverIP=134.170.218.221 ::: userName=johndoe ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"28.168.133.199","externalIp":"134.170.218.221","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=28.168.133.199 ::: serverIP=134.170.218.221 ::: userName=johndoe ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: pushclk-10416.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: pushclk-10416.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-09T16:28:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsMalwarePhishing
streamName: OpenDNS Detection
clientIP: 28.168.133.199
serverIP: 134.170.218.221
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"123.132.83.128","externalIp":"189.107.1.76","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=123.132.83.128 ::: serverIP=189.107.1.76 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "clicksapp.net",
"message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"123.132.83.128\",\"externalIp\":\"189.107.1.76\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=123.132.83.128 ::: serverIP=189.107.1.76 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "clicksapp.net",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-23T15:56:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsPotentially Harmful",
"streamName": "OpenDNS Detection",
"clientIP": "123.132.83.128",
"serverIP": "189.107.1.76",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"123.132.83.128","externalIp":"189.107.1.76","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=123.132.83.128 ::: serverIP=189.107.1.76 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"123.132.83.128","externalIp":"189.107.1.76","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=123.132.83.128 ::: serverIP=189.107.1.76 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: clicksapp.net
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: clicksapp.net
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-23T15:56:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsPotentially Harmful
streamName: OpenDNS Detection
clientIP: 123.132.83.128
serverIP: 189.107.1.76
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"160.102.244.103","externalIp":"120.71.117.79","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=160.102.244.103 ::: serverIP=120.71.117.79 ::: userName=charlie ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "clicksapp.net",
"message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"160.102.244.103\",\"externalIp\":\"120.71.117.79\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=160.102.244.103 ::: serverIP=120.71.117.79 ::: userName=charlie ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "clicksapp.net",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-23T15:56:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsPotentially Harmful",
"streamName": "OpenDNS Detection",
"clientIP": "160.102.244.103",
"serverIP": "120.71.117.79",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"160.102.244.103","externalIp":"120.71.117.79","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=160.102.244.103 ::: serverIP=120.71.117.79 ::: userName=charlie ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"160.102.244.103","externalIp":"120.71.117.79","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=160.102.244.103 ::: serverIP=120.71.117.79 ::: userName=charlie ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: clicksapp.net
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: clicksapp.net
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-23T15:56:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsPotentially Harmful
streamName: OpenDNS Detection
clientIP: 160.102.244.103
serverIP: 120.71.117.79
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"241.121.124.49","externalIp":"30.118.124.12","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=241.121.124.49 ::: serverIP=30.118.124.12 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "clicksapp.net",
"message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"241.121.124.49\",\"externalIp\":\"30.118.124.12\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=241.121.124.49 ::: serverIP=30.118.124.12 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "clicksapp.net",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-23T15:56:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsPotentially Harmful",
"streamName": "OpenDNS Detection",
"clientIP": "241.121.124.49",
"serverIP": "30.118.124.12",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"241.121.124.49","externalIp":"30.118.124.12","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=241.121.124.49 ::: serverIP=30.118.124.12 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"241.121.124.49","externalIp":"30.118.124.12","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=241.121.124.49 ::: serverIP=30.118.124.12 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: clicksapp.net
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: clicksapp.net
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-23T15:56:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsPotentially Harmful
streamName: OpenDNS Detection
clientIP: 241.121.124.49
serverIP: 30.118.124.12
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"219.73.174.216","externalIp":"190.173.166.202","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=219.73.174.216 ::: serverIP=190.173.166.202 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "clicksapp.net",
"message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"219.73.174.216\",\"externalIp\":\"190.173.166.202\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=219.73.174.216 ::: serverIP=190.173.166.202 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "clicksapp.net",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-23T15:56:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsPotentially Harmful",
"streamName": "OpenDNS Detection",
"clientIP": "219.73.174.216",
"serverIP": "190.173.166.202",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"219.73.174.216","externalIp":"190.173.166.202","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=219.73.174.216 ::: serverIP=190.173.166.202 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"219.73.174.216","externalIp":"190.173.166.202","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=219.73.174.216 ::: serverIP=190.173.166.202 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: clicksapp.net
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: clicksapp.net
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-23T15:56:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsPotentially Harmful
streamName: OpenDNS Detection
clientIP: 219.73.174.216
serverIP: 190.173.166.202
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"249.68.185.4","externalIp":"121.106.121.96","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=249.68.185.4 ::: serverIP=121.106.121.96 ::: userName=janedoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "clicksapp.net",
"message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"249.68.185.4\",\"externalIp\":\"121.106.121.96\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=249.68.185.4 ::: serverIP=121.106.121.96 ::: userName=janedoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "clicksapp.net",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-23T15:56:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsPotentially Harmful",
"streamName": "OpenDNS Detection",
"clientIP": "249.68.185.4",
"serverIP": "121.106.121.96",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"249.68.185.4","externalIp":"121.106.121.96","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=249.68.185.4 ::: serverIP=121.106.121.96 ::: userName=janedoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"249.68.185.4","externalIp":"121.106.121.96","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=249.68.185.4 ::: serverIP=121.106.121.96 ::: userName=janedoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: clicksapp.net
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: clicksapp.net
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-23T15:56:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsPotentially Harmful
streamName: OpenDNS Detection
clientIP: 249.68.185.4
serverIP: 121.106.121.96
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"62.126.215.96","externalIp":"153.21.114.221","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=62.126.215.96 ::: serverIP=153.21.114.221 ::: userName=fish ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "clicksapp.net",
"message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"62.126.215.96\",\"externalIp\":\"153.21.114.221\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=62.126.215.96 ::: serverIP=153.21.114.221 ::: userName=fish ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "clicksapp.net",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-23T15:56:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsPotentially Harmful",
"streamName": "OpenDNS Detection",
"clientIP": "62.126.215.96",
"serverIP": "153.21.114.221",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"62.126.215.96","externalIp":"153.21.114.221","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=62.126.215.96 ::: serverIP=153.21.114.221 ::: userName=fish ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"62.126.215.96","externalIp":"153.21.114.221","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=62.126.215.96 ::: serverIP=153.21.114.221 ::: userName=fish ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: clicksapp.net
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: clicksapp.net
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-23T15:56:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsPotentially Harmful
streamName: OpenDNS Detection
clientIP: 62.126.215.96
serverIP: 153.21.114.221
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t11.71.9.166\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"11.71.9.166","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | {
"senderhost": "03SDPBSVR03.SDPB.LOCAL",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-06-28T09:00:21.545Z\",\"agent\":{\"ephemeral_id\":\"2b727ab1-43ea-48f0-bfd5-889fe1c0e702\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-06-28T09:00:22.450Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2dc\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t11.71.9.166\\n\\tSource Port:\\t\\t42806\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (acme.acmecloud.com)\",\"senderHost\":\"03SDPBSVR03.SDPB.LOCAL\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"11.71.9.166\",\"IpPort\":\"42806\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2dc\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":10152}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3955801820,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 42806,
"vendorcode": "3955801820",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "11.71.9.166",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t11.71.9.166\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"11.71.9.166","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t11.71.9.166\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"11.71.9.166","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 03SDPBSVR03.SDPB.LOCAL
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 42806
vendorcode: 3955801820
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 11.71.9.166
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t179.81.149.73\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"179.81.149.73","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | {
"senderhost": "03SDPBSVR03.SDPB.LOCAL",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-06-28T09:00:21.545Z\",\"agent\":{\"ephemeral_id\":\"2b727ab1-43ea-48f0-bfd5-889fe1c0e702\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-06-28T09:00:22.450Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2dc\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t179.81.149.73\\n\\tSource Port:\\t\\t42806\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"03SDPBSVR03.SDPB.LOCAL\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"179.81.149.73\",\"IpPort\":\"42806\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2dc\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":10152}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3955801820,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 42806,
"vendorcode": "3955801820",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "179.81.149.73",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t179.81.149.73\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"179.81.149.73","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t179.81.149.73\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"179.81.149.73","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 03SDPBSVR03.SDPB.LOCAL
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 42806
vendorcode: 3955801820
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 179.81.149.73
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t48.122.65.26\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"48.122.65.26","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | {
"senderhost": "03SDPBSVR03.SDPB.LOCAL",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-06-28T09:00:21.545Z\",\"agent\":{\"ephemeral_id\":\"2b727ab1-43ea-48f0-bfd5-889fe1c0e702\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-06-28T09:00:22.450Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2dc\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t48.122.65.26\\n\\tSource Port:\\t\\t42806\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"03SDPBSVR03.SDPB.LOCAL\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"48.122.65.26\",\"IpPort\":\"42806\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2dc\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":10152}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3955801820,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 42806,
"vendorcode": "3955801820",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "48.122.65.26",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t48.122.65.26\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"48.122.65.26","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t48.122.65.26\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"48.122.65.26","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 03SDPBSVR03.SDPB.LOCAL
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 42806
vendorcode: 3955801820
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 48.122.65.26
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t36.83.105.52\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"36.83.105.52","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | {
"senderhost": "03SDPBSVR03.SDPB.LOCAL",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-06-28T09:00:21.545Z\",\"agent\":{\"ephemeral_id\":\"2b727ab1-43ea-48f0-bfd5-889fe1c0e702\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-06-28T09:00:22.450Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2dc\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t36.83.105.52\\n\\tSource Port:\\t\\t42806\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (stark.starkcloud.com)\",\"senderHost\":\"03SDPBSVR03.SDPB.LOCAL\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"36.83.105.52\",\"IpPort\":\"42806\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2dc\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":10152}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3955801820,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 42806,
"vendorcode": "3955801820",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "36.83.105.52",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t36.83.105.52\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"36.83.105.52","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t36.83.105.52\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"36.83.105.52","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 03SDPBSVR03.SDPB.LOCAL
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 42806
vendorcode: 3955801820
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 36.83.105.52
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t228.44.161.10\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"228.44.161.10","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | {
"senderhost": "03SDPBSVR03.SDPB.LOCAL",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-06-28T09:00:21.545Z\",\"agent\":{\"ephemeral_id\":\"2b727ab1-43ea-48f0-bfd5-889fe1c0e702\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-06-28T09:00:22.450Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2dc\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t228.44.161.10\\n\\tSource Port:\\t\\t42806\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (stark.starkcloud.com)\",\"senderHost\":\"03SDPBSVR03.SDPB.LOCAL\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"228.44.161.10\",\"IpPort\":\"42806\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2dc\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":10152}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3955801820,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 42806,
"vendorcode": "3955801820",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "228.44.161.10",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t228.44.161.10\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"228.44.161.10","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t228.44.161.10\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"228.44.161.10","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 03SDPBSVR03.SDPB.LOCAL
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 42806
vendorcode: 3955801820
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 228.44.161.10
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t112.112.219.245\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"112.112.219.245","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | {
"senderhost": "03SDPBSVR03.SDPB.LOCAL",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-06-28T09:00:21.545Z\",\"agent\":{\"ephemeral_id\":\"2b727ab1-43ea-48f0-bfd5-889fe1c0e702\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-06-28T09:00:22.450Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2dc\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t112.112.219.245\\n\\tSource Port:\\t\\t42806\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (umbrella.umbrellacloud.com)\",\"senderHost\":\"03SDPBSVR03.SDPB.LOCAL\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"112.112.219.245\",\"IpPort\":\"42806\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2dc\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":10152}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3955801820,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 42806,
"vendorcode": "3955801820",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "112.112.219.245",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t112.112.219.245\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"112.112.219.245","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t112.112.219.245\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"112.112.219.245","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 03SDPBSVR03.SDPB.LOCAL
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 42806
vendorcode: 3955801820
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 112.112.219.245
userName: fish | Explain this syslog message |
<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:39.6.94.214/56866 dst outside:151.232.82.15/80 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:39.6.94.214/56866 dst outside:151.232.82.15/80 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 56866,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "39.6.94.214",
"serverIP": "151.232.82.15"
} | Create a JSON artifact from the message |
<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:39.6.94.214/56866 dst outside:151.232.82.15/80 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:39.6.94.214/56866 dst outside:151.232.82.15/80 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 80
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 56866
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 39.6.94.214
serverIP: 151.232.82.15 | Explain this syslog message |
<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:88.92.12.2/56866 dst outside:15.146.97.110/80 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:88.92.12.2/56866 dst outside:15.146.97.110/80 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 56866,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "88.92.12.2",
"serverIP": "15.146.97.110"
} | Create a JSON artifact from the message |
<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:88.92.12.2/56866 dst outside:15.146.97.110/80 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:88.92.12.2/56866 dst outside:15.146.97.110/80 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 80
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 56866
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 88.92.12.2
serverIP: 15.146.97.110 | Explain this syslog message |
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=169.46.177.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.84.26.194 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.84.26.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 38188,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1720815580688 ",
"message": "<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=169.46.177.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=151.84.26.194 spt=38188 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)\" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.84.26.194 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.191.171.1",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "151.84.26.194",
"serverIP": "169.46.177.236",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=169.46.177.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.84.26.194 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.84.26.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=169.46.177.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.84.26.194 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.84.26.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 38188
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1720815580688
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.191.171.1', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 151.84.26.194
serverIP: 169.46.177.236
userName: - | Explain this syslog message |
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=110.66.38.78 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.212.24.187 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.212.24.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 38188,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1720815580688 ",
"message": "<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=110.66.38.78 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=183.212.24.187 spt=38188 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)\" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.212.24.187 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.191.171.1",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "183.212.24.187",
"serverIP": "110.66.38.78",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=110.66.38.78 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.212.24.187 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.212.24.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=110.66.38.78 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.212.24.187 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.212.24.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 38188
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1720815580688
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.191.171.1', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 183.212.24.187
serverIP: 110.66.38.78
userName: - | Explain this syslog message |
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=9.48.109.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.196.101.249 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.196.101.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 38188,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/robots.txt",
"localhostname": "WAFirewall",
"localstarttime": "1720815580688 ",
"message": "<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=9.48.109.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=118.196.101.249 spt=38188 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)\" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.196.101.249 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.191.171.1",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "118.196.101.249",
"serverIP": "9.48.109.138",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=9.48.109.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.196.101.249 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.196.101.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=9.48.109.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.196.101.249 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.196.101.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 38188
facilitycode: 23
facilitylabel: local7
fqdn: /robots.txt
localhostname: WAFirewall
localstarttime: 1720815580688
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.191.171.1', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 118.196.101.249
serverIP: 9.48.109.138
userName: - | Explain this syslog message |
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=196.39.14.205 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=230.190.229.179 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.190.229.179 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 22675,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/api/v2/static/not.found",
"localhostname": "WAFirewall",
"localstarttime": "1716868351150 ",
"message": "<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=196.39.14.205 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=230.190.229.179 spt=22675 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0\" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.190.229.179 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:64.62.197.62",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "230.190.229.179",
"serverIP": "196.39.14.205",
"userName": "-"
} | Create a JSON artifact from the message |
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=196.39.14.205 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=230.190.229.179 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.190.229.179 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=196.39.14.205 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=230.190.229.179 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.190.229.179 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 22675
facilitycode: 23
facilitylabel: local7
fqdn: /api/v2/static/not.found
localhostname: WAFirewall
localstarttime: 1716868351150
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:64.62.197.62', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 230.190.229.179
serverIP: 196.39.14.205
userName: - | Explain this syslog message |
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=157.218.37.188 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=99.79.87.50 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.79.87.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 22675,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/api/v2/static/not.found",
"localhostname": "WAFirewall",
"localstarttime": "1716868351150 ",
"message": "<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=157.218.37.188 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=99.79.87.50 spt=22675 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0\" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.79.87.50 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:64.62.197.62",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "99.79.87.50",
"serverIP": "157.218.37.188",
"userName": "-"
} | Create a JSON artifact from the message |
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=157.218.37.188 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=99.79.87.50 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.79.87.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=157.218.37.188 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=99.79.87.50 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.79.87.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 22675
facilitycode: 23
facilitylabel: local7
fqdn: /api/v2/static/not.found
localhostname: WAFirewall
localstarttime: 1716868351150
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:64.62.197.62', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 99.79.87.50
serverIP: 157.218.37.188
userName: - | Explain this syslog message |
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=8.65.70.249 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=243.164.118.175 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=243.164.118.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 22675,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/api/v2/static/not.found",
"localhostname": "WAFirewall",
"localstarttime": "1716868351150 ",
"message": "<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=8.65.70.249 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=243.164.118.175 spt=22675 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0\" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=243.164.118.175 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:64.62.197.62",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "243.164.118.175",
"serverIP": "8.65.70.249",
"userName": "-"
} | Create a JSON artifact from the message |
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=8.65.70.249 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=243.164.118.175 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=243.164.118.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=8.65.70.249 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=243.164.118.175 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=243.164.118.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 22675
facilitycode: 23
facilitylabel: local7
fqdn: /api/v2/static/not.found
localhostname: WAFirewall
localstarttime: 1716868351150
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:64.62.197.62', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 243.164.118.175
serverIP: 8.65.70.249
userName: - | Explain this syslog message |
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=186.35.171.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=1.220.123.143 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=1.220.123.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:185.224.128.219",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=186.35.171.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=1.220.123.143 spt=36930 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=1.220.123.143 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675137566923 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/_asterisk/",
"clientport": 36930,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "1.220.123.143",
"serverIP": "186.35.171.47",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=186.35.171.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=1.220.123.143 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=1.220.123.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=186.35.171.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=1.220.123.143 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=1.220.123.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675137566923
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /_asterisk/
clientport: 36930
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 1.220.123.143
serverIP: 186.35.171.47
userName: - | Explain this syslog message |
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.172.136.206 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=230.6.77.11 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.6.77.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:185.224.128.219",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.172.136.206 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=230.6.77.11 spt=36930 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.6.77.11 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675137566923 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/_asterisk/",
"clientport": 36930,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "230.6.77.11",
"serverIP": "104.172.136.206",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.172.136.206 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=230.6.77.11 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.6.77.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.172.136.206 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=230.6.77.11 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.6.77.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675137566923
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /_asterisk/
clientport: 36930
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 230.6.77.11
serverIP: 104.172.136.206
userName: - | Explain this syslog message |
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=143.82.129.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.177.238.209 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.177.238.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:185.224.128.219",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=143.82.129.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=159.177.238.209 spt=36930 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.177.238.209 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675137566923 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/_asterisk/",
"clientport": 36930,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "159.177.238.209",
"serverIP": "143.82.129.36",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=143.82.129.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.177.238.209 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.177.238.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=143.82.129.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.177.238.209 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.177.238.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675137566923
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /_asterisk/
clientport: 36930
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 159.177.238.209
serverIP: 143.82.129.36
userName: - | Explain this syslog message |
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=141.54.80.158 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=176.46.24.54 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.46.24.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:185.224.128.219",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=141.54.80.158 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=176.46.24.54 spt=36930 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.46.24.54 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675137566923 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/_asterisk/",
"clientport": 36930,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "176.46.24.54",
"serverIP": "141.54.80.158",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=141.54.80.158 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=176.46.24.54 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.46.24.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=141.54.80.158 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=176.46.24.54 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.46.24.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675137566923
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /_asterisk/
clientport: 36930
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 176.46.24.54
serverIP: 141.54.80.158
userName: - | Explain this syslog message |
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.222.157.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.19.173.47 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.19.173.47 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:164.52.25.251",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.222.157.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=255.19.173.47 spt=39235 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.19.173.47 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675137578485 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 39235,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "255.19.173.47",
"serverIP": "36.222.157.93",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.222.157.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.19.173.47 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.19.173.47 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.222.157.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.19.173.47 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.19.173.47 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1675137578485
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 39235
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 255.19.173.47
serverIP: 36.222.157.93
userName: - | Explain this syslog message |
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=238.115.216.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=17.86.26.161 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.86.26.161 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:164.52.25.251",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=238.115.216.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=17.86.26.161 spt=39235 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.86.26.161 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675137578485 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 39235,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "17.86.26.161",
"serverIP": "238.115.216.61",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=238.115.216.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=17.86.26.161 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.86.26.161 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=238.115.216.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=17.86.26.161 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.86.26.161 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1675137578485
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 39235
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 17.86.26.161
serverIP: 238.115.216.61
userName: - | Explain this syslog message |
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=9.250.239.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=123.6.207.223 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.6.207.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:164.52.25.251",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=9.250.239.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=123.6.207.223 spt=39235 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.6.207.223 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675137578485 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 39235,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "123.6.207.223",
"serverIP": "9.250.239.168",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=9.250.239.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=123.6.207.223 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.6.207.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=9.250.239.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=123.6.207.223 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.6.207.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1675137578485
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 39235
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 123.6.207.223
serverIP: 9.250.239.168
userName: - | Explain this syslog message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=16.170.240.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=121.92.111.236 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.92.111.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:164.52.25.251",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=16.170.240.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=121.92.111.236 spt=58224 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.92.111.236 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675137584697 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/favicon.ico",
"clientport": 58224,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "121.92.111.236",
"serverIP": "16.170.240.52",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=16.170.240.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=121.92.111.236 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.92.111.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=16.170.240.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=121.92.111.236 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.92.111.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1675137584697
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /favicon.ico
clientport: 58224
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 121.92.111.236
serverIP: 16.170.240.52
userName: - | Explain this syslog message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=10.170.9.163 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=87.93.6.233 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.93.6.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:164.52.25.251",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=10.170.9.163 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=87.93.6.233 spt=58224 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.93.6.233 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675137584697 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/favicon.ico",
"clientport": 58224,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "87.93.6.233",
"serverIP": "10.170.9.163",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=10.170.9.163 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=87.93.6.233 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.93.6.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=10.170.9.163 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=87.93.6.233 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.93.6.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1675137584697
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /favicon.ico
clientport: 58224
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 87.93.6.233
serverIP: 10.170.9.163
userName: - | Explain this syslog message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=53.44.190.183 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=174.227.133.156 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.227.133.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:164.52.25.251",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=53.44.190.183 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=174.227.133.156 spt=58224 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.227.133.156 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675137584697 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/favicon.ico",
"clientport": 58224,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "174.227.133.156",
"serverIP": "53.44.190.183",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=53.44.190.183 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=174.227.133.156 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.227.133.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=53.44.190.183 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=174.227.133.156 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.227.133.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1675137584697
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /favicon.ico
clientport: 58224
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 174.227.133.156
serverIP: 53.44.190.183
userName: - | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.