input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"122.184.55.21","externalIp":"107.118.204.201","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=122.184.55.21 ::: serverIP=107.118.204.201 ::: userName=charlie ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-09T16:28:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 122.184.55.21 serverIP: 107.118.204.201 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"220.3.199.102","externalIp":"7.22.171.85","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=220.3.199.102 ::: serverIP=7.22.171.85 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"220.3.199.102\",\"externalIp\":\"7.22.171.85\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-09T16:28:18.000Z\"} ::: clientIP=220.3.199.102 ::: serverIP=7.22.171.85 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-09T16:28:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "220.3.199.102", "serverIP": "7.22.171.85", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"220.3.199.102","externalIp":"7.22.171.85","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=220.3.199.102 ::: serverIP=7.22.171.85 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"220.3.199.102","externalIp":"7.22.171.85","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=220.3.199.102 ::: serverIP=7.22.171.85 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-09T16:28:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 220.3.199.102 serverIP: 7.22.171.85 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"108.85.3.253","externalIp":"144.69.138.115","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=108.85.3.253 ::: serverIP=144.69.138.115 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"108.85.3.253\",\"externalIp\":\"144.69.138.115\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-09T16:28:18.000Z\"} ::: clientIP=108.85.3.253 ::: serverIP=144.69.138.115 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-09T16:28:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "108.85.3.253", "serverIP": "144.69.138.115", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"108.85.3.253","externalIp":"144.69.138.115","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=108.85.3.253 ::: serverIP=144.69.138.115 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"108.85.3.253","externalIp":"144.69.138.115","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=108.85.3.253 ::: serverIP=144.69.138.115 ::: userName=fish ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-09T16:28:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 108.85.3.253 serverIP: 144.69.138.115 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"28.168.133.199","externalIp":"134.170.218.221","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=28.168.133.199 ::: serverIP=134.170.218.221 ::: userName=johndoe ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "pushclk-10416.com", "message": "WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"28.168.133.199\",\"externalIp\":\"134.170.218.221\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"pushclk-10416.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-09T16:28:18.000Z\"} ::: clientIP=28.168.133.199 ::: serverIP=134.170.218.221 ::: userName=johndoe ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "pushclk-10416.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-09T16:28:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsMalwarePhishing", "streamName": "OpenDNS Detection", "clientIP": "28.168.133.199", "serverIP": "134.170.218.221", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"28.168.133.199","externalIp":"134.170.218.221","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=28.168.133.199 ::: serverIP=134.170.218.221 ::: userName=johndoe ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pushclk-10416.com ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"28.168.133.199","externalIp":"134.170.218.221","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"pushclk-10416.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-09T16:28:18.000Z"} ::: clientIP=28.168.133.199 ::: serverIP=134.170.218.221 ::: userName=johndoe ::: created_at=2023-05-09T16:28:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-09T16:28:18.000Z ::: serverHostname=pushclk-10416.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: pushclk-10416.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: pushclk-10416.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-09T16:28:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsMalwarePhishing streamName: OpenDNS Detection clientIP: 28.168.133.199 serverIP: 134.170.218.221 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"123.132.83.128","externalIp":"189.107.1.76","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=123.132.83.128 ::: serverIP=189.107.1.76 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"123.132.83.128\",\"externalIp\":\"189.107.1.76\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=123.132.83.128 ::: serverIP=189.107.1.76 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "123.132.83.128", "serverIP": "189.107.1.76", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"123.132.83.128","externalIp":"189.107.1.76","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=123.132.83.128 ::: serverIP=189.107.1.76 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"123.132.83.128","externalIp":"189.107.1.76","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=123.132.83.128 ::: serverIP=189.107.1.76 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 123.132.83.128 serverIP: 189.107.1.76 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"160.102.244.103","externalIp":"120.71.117.79","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=160.102.244.103 ::: serverIP=120.71.117.79 ::: userName=charlie ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"160.102.244.103\",\"externalIp\":\"120.71.117.79\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=160.102.244.103 ::: serverIP=120.71.117.79 ::: userName=charlie ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "160.102.244.103", "serverIP": "120.71.117.79", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"160.102.244.103","externalIp":"120.71.117.79","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=160.102.244.103 ::: serverIP=120.71.117.79 ::: userName=charlie ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"160.102.244.103","externalIp":"120.71.117.79","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=160.102.244.103 ::: serverIP=120.71.117.79 ::: userName=charlie ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 160.102.244.103 serverIP: 120.71.117.79 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"241.121.124.49","externalIp":"30.118.124.12","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=241.121.124.49 ::: serverIP=30.118.124.12 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"241.121.124.49\",\"externalIp\":\"30.118.124.12\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=241.121.124.49 ::: serverIP=30.118.124.12 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "241.121.124.49", "serverIP": "30.118.124.12", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"241.121.124.49","externalIp":"30.118.124.12","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=241.121.124.49 ::: serverIP=30.118.124.12 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"241.121.124.49","externalIp":"30.118.124.12","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=241.121.124.49 ::: serverIP=30.118.124.12 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 241.121.124.49 serverIP: 30.118.124.12 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"219.73.174.216","externalIp":"190.173.166.202","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=219.73.174.216 ::: serverIP=190.173.166.202 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"219.73.174.216\",\"externalIp\":\"190.173.166.202\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=219.73.174.216 ::: serverIP=190.173.166.202 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "219.73.174.216", "serverIP": "190.173.166.202", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"219.73.174.216","externalIp":"190.173.166.202","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=219.73.174.216 ::: serverIP=190.173.166.202 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"219.73.174.216","externalIp":"190.173.166.202","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=219.73.174.216 ::: serverIP=190.173.166.202 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 219.73.174.216 serverIP: 190.173.166.202 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"249.68.185.4","externalIp":"121.106.121.96","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=249.68.185.4 ::: serverIP=121.106.121.96 ::: userName=janedoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"249.68.185.4\",\"externalIp\":\"121.106.121.96\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=249.68.185.4 ::: serverIP=121.106.121.96 ::: userName=janedoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "249.68.185.4", "serverIP": "121.106.121.96", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"249.68.185.4","externalIp":"121.106.121.96","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=249.68.185.4 ::: serverIP=121.106.121.96 ::: userName=janedoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"249.68.185.4","externalIp":"121.106.121.96","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=249.68.185.4 ::: serverIP=121.106.121.96 ::: userName=janedoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 249.68.185.4 serverIP: 121.106.121.96 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"62.126.215.96","externalIp":"153.21.114.221","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=62.126.215.96 ::: serverIP=153.21.114.221 ::: userName=fish ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"62.126.215.96\",\"externalIp\":\"153.21.114.221\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=62.126.215.96 ::: serverIP=153.21.114.221 ::: userName=fish ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "62.126.215.96", "serverIP": "153.21.114.221", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"62.126.215.96","externalIp":"153.21.114.221","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=62.126.215.96 ::: serverIP=153.21.114.221 ::: userName=fish ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"62.126.215.96","externalIp":"153.21.114.221","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=62.126.215.96 ::: serverIP=153.21.114.221 ::: userName=fish ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 62.126.215.96 serverIP: 153.21.114.221 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t11.71.9.166\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"11.71.9.166","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
{ "senderhost": "03SDPBSVR03.SDPB.LOCAL", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-06-28T09:00:21.545Z\",\"agent\":{\"ephemeral_id\":\"2b727ab1-43ea-48f0-bfd5-889fe1c0e702\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-06-28T09:00:22.450Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2dc\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t11.71.9.166\\n\\tSource Port:\\t\\t42806\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (acme.acmecloud.com)\",\"senderHost\":\"03SDPBSVR03.SDPB.LOCAL\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"11.71.9.166\",\"IpPort\":\"42806\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2dc\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":10152}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3955801820,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 42806, "vendorcode": "3955801820", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "11.71.9.166", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t11.71.9.166\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"11.71.9.166","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t11.71.9.166\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"11.71.9.166","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: 03SDPBSVR03.SDPB.LOCAL severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 42806 vendorcode: 3955801820 action: Logon streamName: microsoft-windows-security-auditing clientIP: 11.71.9.166 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t179.81.149.73\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"179.81.149.73","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
{ "senderhost": "03SDPBSVR03.SDPB.LOCAL", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-06-28T09:00:21.545Z\",\"agent\":{\"ephemeral_id\":\"2b727ab1-43ea-48f0-bfd5-889fe1c0e702\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-06-28T09:00:22.450Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2dc\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t179.81.149.73\\n\\tSource Port:\\t\\t42806\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"03SDPBSVR03.SDPB.LOCAL\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"179.81.149.73\",\"IpPort\":\"42806\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2dc\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":10152}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3955801820,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 42806, "vendorcode": "3955801820", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "179.81.149.73", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t179.81.149.73\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"179.81.149.73","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t179.81.149.73\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"179.81.149.73","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: 03SDPBSVR03.SDPB.LOCAL severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 42806 vendorcode: 3955801820 action: Logon streamName: microsoft-windows-security-auditing clientIP: 179.81.149.73 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t48.122.65.26\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"48.122.65.26","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
{ "senderhost": "03SDPBSVR03.SDPB.LOCAL", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-06-28T09:00:21.545Z\",\"agent\":{\"ephemeral_id\":\"2b727ab1-43ea-48f0-bfd5-889fe1c0e702\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-06-28T09:00:22.450Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2dc\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t48.122.65.26\\n\\tSource Port:\\t\\t42806\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"03SDPBSVR03.SDPB.LOCAL\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"48.122.65.26\",\"IpPort\":\"42806\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2dc\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":10152}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3955801820,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 42806, "vendorcode": "3955801820", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "48.122.65.26", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t48.122.65.26\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"48.122.65.26","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t48.122.65.26\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"48.122.65.26","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: 03SDPBSVR03.SDPB.LOCAL severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 42806 vendorcode: 3955801820 action: Logon streamName: microsoft-windows-security-auditing clientIP: 48.122.65.26 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t36.83.105.52\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"36.83.105.52","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
{ "senderhost": "03SDPBSVR03.SDPB.LOCAL", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-06-28T09:00:21.545Z\",\"agent\":{\"ephemeral_id\":\"2b727ab1-43ea-48f0-bfd5-889fe1c0e702\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-06-28T09:00:22.450Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2dc\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t36.83.105.52\\n\\tSource Port:\\t\\t42806\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (stark.starkcloud.com)\",\"senderHost\":\"03SDPBSVR03.SDPB.LOCAL\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"36.83.105.52\",\"IpPort\":\"42806\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2dc\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":10152}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3955801820,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 42806, "vendorcode": "3955801820", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "36.83.105.52", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t36.83.105.52\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"36.83.105.52","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t36.83.105.52\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"36.83.105.52","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: 03SDPBSVR03.SDPB.LOCAL severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 42806 vendorcode: 3955801820 action: Logon streamName: microsoft-windows-security-auditing clientIP: 36.83.105.52 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t228.44.161.10\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"228.44.161.10","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
{ "senderhost": "03SDPBSVR03.SDPB.LOCAL", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-06-28T09:00:21.545Z\",\"agent\":{\"ephemeral_id\":\"2b727ab1-43ea-48f0-bfd5-889fe1c0e702\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-06-28T09:00:22.450Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2dc\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t228.44.161.10\\n\\tSource Port:\\t\\t42806\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (stark.starkcloud.com)\",\"senderHost\":\"03SDPBSVR03.SDPB.LOCAL\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"228.44.161.10\",\"IpPort\":\"42806\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2dc\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":10152}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3955801820,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 42806, "vendorcode": "3955801820", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "228.44.161.10", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t228.44.161.10\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"228.44.161.10","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t228.44.161.10\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"228.44.161.10","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: 03SDPBSVR03.SDPB.LOCAL severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 42806 vendorcode: 3955801820 action: Logon streamName: microsoft-windows-security-auditing clientIP: 228.44.161.10 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t112.112.219.245\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"112.112.219.245","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
{ "senderhost": "03SDPBSVR03.SDPB.LOCAL", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-06-28T09:00:21.545Z\",\"agent\":{\"ephemeral_id\":\"2b727ab1-43ea-48f0-bfd5-889fe1c0e702\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-06-28T09:00:22.450Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2dc\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t112.112.219.245\\n\\tSource Port:\\t\\t42806\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (umbrella.umbrellacloud.com)\",\"senderHost\":\"03SDPBSVR03.SDPB.LOCAL\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"112.112.219.245\",\"IpPort\":\"42806\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2dc\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":10152}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":3955801820,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 42806, "vendorcode": "3955801820", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "112.112.219.245", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t112.112.219.245\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"112.112.219.245","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-06-28T09:00:21.545Z","agent":{"ephemeral_id":"2b727ab1-43ea-48f0-bfd5-889fe1c0e702","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-06-28T09:00:22.450Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2dc\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t112.112.219.245\n\tSource Port:\t\t42806\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"03SDPBSVR03.SDPB.LOCAL","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"112.112.219.245","IpPort":"42806","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2dc","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":10152}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":3955801820,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: 03SDPBSVR03.SDPB.LOCAL severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 42806 vendorcode: 3955801820 action: Logon streamName: microsoft-windows-security-auditing clientIP: 112.112.219.245 userName: fish
Explain this syslog message
<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:39.6.94.214/56866 dst outside:151.232.82.15/80 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:39.6.94.214/56866 dst outside:151.232.82.15/80 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 56866, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "39.6.94.214", "serverIP": "151.232.82.15" }
Create a JSON artifact from the message
<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:39.6.94.214/56866 dst outside:151.232.82.15/80 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:39.6.94.214/56866 dst outside:151.232.82.15/80 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 80 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 56866 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 39.6.94.214 serverIP: 151.232.82.15
Explain this syslog message
<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:88.92.12.2/56866 dst outside:15.146.97.110/80 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:88.92.12.2/56866 dst outside:15.146.97.110/80 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 56866, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "88.92.12.2", "serverIP": "15.146.97.110" }
Create a JSON artifact from the message
<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:88.92.12.2/56866 dst outside:15.146.97.110/80 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Apr 15 2023 22:01:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:88.92.12.2/56866 dst outside:15.146.97.110/80 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 80 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 56866 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 88.92.12.2 serverIP: 15.146.97.110
Explain this syslog message
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=169.46.177.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.84.26.194 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.84.26.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 38188, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/robots.txt", "localhostname": "WAFirewall", "localstarttime": "1720815580688 ", "message": "<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=169.46.177.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=151.84.26.194 spt=38188 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)\" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.84.26.194 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:185.191.171.1", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "151.84.26.194", "serverIP": "169.46.177.236", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=169.46.177.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.84.26.194 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.84.26.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=169.46.177.236 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.84.26.194 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.84.26.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 38188 facilitycode: 23 facilitylabel: local7 fqdn: /robots.txt localhostname: WAFirewall localstarttime: 1720815580688 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.191.171.1', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 151.84.26.194 serverIP: 169.46.177.236 userName: -
Explain this syslog message
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=110.66.38.78 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.212.24.187 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.212.24.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 38188, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/robots.txt", "localhostname": "WAFirewall", "localstarttime": "1720815580688 ", "message": "<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=110.66.38.78 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=183.212.24.187 spt=38188 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)\" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.212.24.187 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:185.191.171.1", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "183.212.24.187", "serverIP": "110.66.38.78", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=110.66.38.78 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.212.24.187 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.212.24.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=110.66.38.78 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=183.212.24.187 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=183.212.24.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 38188 facilitycode: 23 facilitylabel: local7 fqdn: /robots.txt localhostname: WAFirewall localstarttime: 1720815580688 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.191.171.1', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 183.212.24.187 serverIP: 110.66.38.78 userName: -
Explain this syslog message
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=9.48.109.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.196.101.249 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.196.101.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 38188, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/robots.txt", "localhostname": "WAFirewall", "localstarttime": "1720815580688 ", "message": "<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=9.48.109.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=118.196.101.249 spt=38188 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)\" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.196.101.249 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:185.191.171.1", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "118.196.101.249", "serverIP": "9.48.109.138", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=9.48.109.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.196.101.249 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.196.101.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 12 15:19:40 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=9.48.109.138 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.196.101.249 spt=38188 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 12 2024 15:19:40 rt=1720815580688 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)" dvchost=WAFirewall externalId=190a899f5f2-8ca49da cn2=38188 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.196.101.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 38188 facilitycode: 23 facilitylabel: local7 fqdn: /robots.txt localhostname: WAFirewall localstarttime: 1720815580688 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.191.171.1', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 118.196.101.249 serverIP: 9.48.109.138 userName: -
Explain this syslog message
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=196.39.14.205 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=230.190.229.179 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.190.229.179 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 22675, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/api/v2/static/not.found", "localhostname": "WAFirewall", "localstarttime": "1716868351150 ", "message": "<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=196.39.14.205 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=230.190.229.179 spt=22675 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0\" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.190.229.179 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:64.62.197.62", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "230.190.229.179", "serverIP": "196.39.14.205", "userName": "-" }
Create a JSON artifact from the message
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=196.39.14.205 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=230.190.229.179 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.190.229.179 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=196.39.14.205 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=230.190.229.179 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.190.229.179 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 22675 facilitycode: 23 facilitylabel: local7 fqdn: /api/v2/static/not.found localhostname: WAFirewall localstarttime: 1716868351150 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:64.62.197.62', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 230.190.229.179 serverIP: 196.39.14.205 userName: -
Explain this syslog message
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=157.218.37.188 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=99.79.87.50 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.79.87.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 22675, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/api/v2/static/not.found", "localhostname": "WAFirewall", "localstarttime": "1716868351150 ", "message": "<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=157.218.37.188 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=99.79.87.50 spt=22675 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0\" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.79.87.50 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:64.62.197.62", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "99.79.87.50", "serverIP": "157.218.37.188", "userName": "-" }
Create a JSON artifact from the message
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=157.218.37.188 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=99.79.87.50 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.79.87.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=157.218.37.188 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=99.79.87.50 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=99.79.87.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 22675 facilitycode: 23 facilitylabel: local7 fqdn: /api/v2/static/not.found localhostname: WAFirewall localstarttime: 1716868351150 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:64.62.197.62', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 99.79.87.50 serverIP: 157.218.37.188 userName: -
Explain this syslog message
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=8.65.70.249 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=243.164.118.175 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=243.164.118.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 22675, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/api/v2/static/not.found", "localhostname": "WAFirewall", "localstarttime": "1716868351150 ", "message": "<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=8.65.70.249 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=243.164.118.175 spt=22675 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0\" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=243.164.118.175 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:64.62.197.62", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "243.164.118.175", "serverIP": "8.65.70.249", "userName": "-" }
Create a JSON artifact from the message
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=8.65.70.249 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=243.164.118.175 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=243.164.118.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>May 27 22:52:31 WAFirewall CEF:0|Barracuda|WAF|1220|342|GEO_IP_BLOCK|1|cat=WF dst=8.65.70.249 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=243.164.118.175 spt=22675 requestMethod=GET app=TLSv1.2 requestContext="-" start=May 27 2024 22:52:31 rt=1716868351150 request=/api/v2/static/not.found requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0" dvchost=WAFirewall externalId=18fbd5404ae-e39c47ab cn2=22675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=243.164.118.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 22675 facilitycode: 23 facilitylabel: local7 fqdn: /api/v2/static/not.found localhostname: WAFirewall localstarttime: 1716868351150 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:64.62.197.62', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 243.164.118.175 serverIP: 8.65.70.249 userName: -
Explain this syslog message
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=186.35.171.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=1.220.123.143 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=1.220.123.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:185.224.128.219", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=186.35.171.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=1.220.123.143 spt=36930 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=1.220.123.143 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675137566923 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/_asterisk/", "clientport": 36930, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "1.220.123.143", "serverIP": "186.35.171.47", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=186.35.171.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=1.220.123.143 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=1.220.123.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=186.35.171.47 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=1.220.123.143 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=1.220.123.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675137566923 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /_asterisk/ clientport: 36930 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 1.220.123.143 serverIP: 186.35.171.47 userName: -
Explain this syslog message
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.172.136.206 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=230.6.77.11 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.6.77.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:185.224.128.219", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.172.136.206 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=230.6.77.11 spt=36930 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.6.77.11 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675137566923 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/_asterisk/", "clientport": 36930, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "230.6.77.11", "serverIP": "104.172.136.206", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.172.136.206 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=230.6.77.11 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.6.77.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=104.172.136.206 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=230.6.77.11 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.6.77.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675137566923 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /_asterisk/ clientport: 36930 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 230.6.77.11 serverIP: 104.172.136.206 userName: -
Explain this syslog message
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=143.82.129.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.177.238.209 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.177.238.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:185.224.128.219", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=143.82.129.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=159.177.238.209 spt=36930 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.177.238.209 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675137566923 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/_asterisk/", "clientport": 36930, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "159.177.238.209", "serverIP": "143.82.129.36", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=143.82.129.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.177.238.209 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.177.238.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=143.82.129.36 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.177.238.209 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.177.238.209 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675137566923 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /_asterisk/ clientport: 36930 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 159.177.238.209 serverIP: 143.82.129.36 userName: -
Explain this syslog message
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=141.54.80.158 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=176.46.24.54 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.46.24.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:185.224.128.219", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=141.54.80.158 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=176.46.24.54 spt=36930 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.46.24.54 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675137566923 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/_asterisk/", "clientport": 36930, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "176.46.24.54", "serverIP": "141.54.80.158", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=141.54.80.158 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=176.46.24.54 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.46.24.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 30 21:59:26 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=141.54.80.158 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=176.46.24.54 spt=36930 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:26 rt=1675137566923 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=18605fac8c0-7defb1d4 cn2=36930 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=176.46.24.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675137566923 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /_asterisk/ clientport: 36930 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 176.46.24.54 serverIP: 141.54.80.158 userName: -
Explain this syslog message
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.222.157.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.19.173.47 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.19.173.47 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:164.52.25.251", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.222.157.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=255.19.173.47 spt=39235 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.19.173.47 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675137578485 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 39235, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "255.19.173.47", "serverIP": "36.222.157.93", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.222.157.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.19.173.47 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.19.173.47 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=36.222.157.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=255.19.173.47 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=255.19.173.47 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1675137578485 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 39235 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 255.19.173.47 serverIP: 36.222.157.93 userName: -
Explain this syslog message
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=238.115.216.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=17.86.26.161 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.86.26.161 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:164.52.25.251", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=238.115.216.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=17.86.26.161 spt=39235 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.86.26.161 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675137578485 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 39235, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "17.86.26.161", "serverIP": "238.115.216.61", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=238.115.216.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=17.86.26.161 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.86.26.161 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=238.115.216.61 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=17.86.26.161 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.86.26.161 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1675137578485 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 39235 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 17.86.26.161 serverIP: 238.115.216.61 userName: -
Explain this syslog message
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=9.250.239.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=123.6.207.223 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.6.207.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:164.52.25.251", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=9.250.239.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=123.6.207.223 spt=39235 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.6.207.223 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675137578485 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 39235, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "123.6.207.223", "serverIP": "9.250.239.168", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=9.250.239.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=123.6.207.223 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.6.207.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 30 21:59:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=9.250.239.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=123.6.207.223 spt=39235 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:38 rt=1675137578485 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605faf5dc-45bf66c4 cn2=39235 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=123.6.207.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1675137578485 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 39235 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 123.6.207.223 serverIP: 9.250.239.168 userName: -
Explain this syslog message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=16.170.240.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=121.92.111.236 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.92.111.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:164.52.25.251", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=16.170.240.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=121.92.111.236 spt=58224 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.92.111.236 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675137584697 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/favicon.ico", "clientport": 58224, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "121.92.111.236", "serverIP": "16.170.240.52", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=16.170.240.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=121.92.111.236 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.92.111.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=16.170.240.52 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=121.92.111.236 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.92.111.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1675137584697 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /favicon.ico clientport: 58224 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 121.92.111.236 serverIP: 16.170.240.52 userName: -
Explain this syslog message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=10.170.9.163 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=87.93.6.233 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.93.6.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:164.52.25.251", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=10.170.9.163 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=87.93.6.233 spt=58224 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.93.6.233 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675137584697 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/favicon.ico", "clientport": 58224, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "87.93.6.233", "serverIP": "10.170.9.163", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=10.170.9.163 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=87.93.6.233 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.93.6.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=10.170.9.163 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=87.93.6.233 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=87.93.6.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1675137584697 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /favicon.ico clientport: 58224 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 87.93.6.233 serverIP: 10.170.9.163 userName: -
Explain this syslog message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=53.44.190.183 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=174.227.133.156 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.227.133.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:164.52.25.251", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=53.44.190.183 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=174.227.133.156 spt=58224 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.227.133.156 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675137584697 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/favicon.ico", "clientport": 58224, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "174.227.133.156", "serverIP": "53.44.190.183", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=53.44.190.183 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=174.227.133.156 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.227.133.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=53.44.190.183 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=174.227.133.156 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=174.227.133.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1675137584697 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /favicon.ico clientport: 58224 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 174.227.133.156 serverIP: 53.44.190.183 userName: -
Explain this syslog message