input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"252.203.173.167","externalIp":"143.91.115.216","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=252.203.173.167 ::: serverIP=143.91.115.216 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-07T11:10:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"252.203.173.167\",\"externalIp\":\"143.91.115.216\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"relaxationstationmassages.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-07T11:10:25.000Z\"} ::: clientIP=252.203.173.167 ::: serverIP=143.91.115.216 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "relaxationstationmassages.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "relaxationstationmassages.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "252.203.173.167",
"serverIP": "143.91.115.216",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"252.203.173.167","externalIp":"143.91.115.216","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=252.203.173.167 ::: serverIP=143.91.115.216 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"252.203.173.167","externalIp":"143.91.115.216","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=252.203.173.167 ::: serverIP=143.91.115.216 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-07T11:10:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: relaxationstationmassages.com
messagetype: firewall_action
severitycode: 2
fqdn: relaxationstationmassages.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 252.203.173.167
serverIP: 143.91.115.216
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"84.128.65.163","externalIp":"138.127.174.33","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=84.128.65.163 ::: serverIP=138.127.174.33 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-07T11:10:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"84.128.65.163\",\"externalIp\":\"138.127.174.33\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"relaxationstationmassages.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-07T11:10:25.000Z\"} ::: clientIP=84.128.65.163 ::: serverIP=138.127.174.33 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "relaxationstationmassages.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "relaxationstationmassages.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "84.128.65.163",
"serverIP": "138.127.174.33",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"84.128.65.163","externalIp":"138.127.174.33","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=84.128.65.163 ::: serverIP=138.127.174.33 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"84.128.65.163","externalIp":"138.127.174.33","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=84.128.65.163 ::: serverIP=138.127.174.33 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-07T11:10:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: relaxationstationmassages.com
messagetype: firewall_action
severitycode: 2
fqdn: relaxationstationmassages.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 84.128.65.163
serverIP: 138.127.174.33
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"42.171.94.58","externalIp":"42.171.94.58","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=42.171.94.58 ::: serverIP=42.171.94.58 ::: userName=janedoe ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T18:04:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"42.171.94.58\",\"externalIp\":\"42.171.94.58\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T18:04:37.000Z\"} ::: clientIP=42.171.94.58 ::: serverIP=42.171.94.58 ::: userName=janedoe ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "42.171.94.58",
"serverIP": "127.92.108.151",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"42.171.94.58","externalIp":"42.171.94.58","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=42.171.94.58 ::: serverIP=42.171.94.58 ::: userName=janedoe ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"42.171.94.58","externalIp":"42.171.94.58","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=42.171.94.58 ::: serverIP=42.171.94.58 ::: userName=janedoe ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T18:04:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 42.171.94.58
serverIP: 127.92.108.151
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"81.63.42.219","externalIp":"81.63.42.219","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=81.63.42.219 ::: serverIP=81.63.42.219 ::: userName=fish ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T18:04:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"81.63.42.219\",\"externalIp\":\"81.63.42.219\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T18:04:37.000Z\"} ::: clientIP=81.63.42.219 ::: serverIP=81.63.42.219 ::: userName=fish ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "81.63.42.219",
"serverIP": "31.2.248.250",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"81.63.42.219","externalIp":"81.63.42.219","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=81.63.42.219 ::: serverIP=81.63.42.219 ::: userName=fish ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"81.63.42.219","externalIp":"81.63.42.219","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=81.63.42.219 ::: serverIP=81.63.42.219 ::: userName=fish ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T18:04:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 81.63.42.219
serverIP: 31.2.248.250
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"204.226.169.34","externalIp":"204.226.169.34","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=204.226.169.34 ::: serverIP=204.226.169.34 ::: userName=alice ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T18:04:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"204.226.169.34\",\"externalIp\":\"204.226.169.34\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T18:04:37.000Z\"} ::: clientIP=204.226.169.34 ::: serverIP=204.226.169.34 ::: userName=alice ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "204.226.169.34",
"serverIP": "68.212.185.194",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"204.226.169.34","externalIp":"204.226.169.34","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=204.226.169.34 ::: serverIP=204.226.169.34 ::: userName=alice ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"204.226.169.34","externalIp":"204.226.169.34","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=204.226.169.34 ::: serverIP=204.226.169.34 ::: userName=alice ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T18:04:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 204.226.169.34
serverIP: 68.212.185.194
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"175.244.231.116","externalIp":"175.244.231.116","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=175.244.231.116 ::: serverIP=175.244.231.116 ::: userName=nighthawk ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T18:04:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"175.244.231.116\",\"externalIp\":\"175.244.231.116\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T18:04:37.000Z\"} ::: clientIP=175.244.231.116 ::: serverIP=175.244.231.116 ::: userName=nighthawk ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "175.244.231.116",
"serverIP": "143.30.154.97",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"175.244.231.116","externalIp":"175.244.231.116","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=175.244.231.116 ::: serverIP=175.244.231.116 ::: userName=nighthawk ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"175.244.231.116","externalIp":"175.244.231.116","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=175.244.231.116 ::: serverIP=175.244.231.116 ::: userName=nighthawk ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T18:04:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 175.244.231.116
serverIP: 143.30.154.97
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"122.80.208.167","externalIp":"254.141.105.58","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-12T14:15:29.000Z"} ::: clientIP=122.80.208.167 ::: serverIP=254.141.105.58 ::: userName=nighthawk ::: created_at=2022-05-12T14:15:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T14:15:29.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T14:15:29.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"122.80.208.167\",\"externalIp\":\"254.141.105.58\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T14:15:29.000Z\"} ::: clientIP=122.80.208.167 ::: serverIP=254.141.105.58 ::: userName=nighthawk ::: created_at=2022-05-12T14:15:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T14:15:29.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "122.80.208.167",
"serverIP": "254.141.105.58",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"122.80.208.167","externalIp":"254.141.105.58","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-12T14:15:29.000Z"} ::: clientIP=122.80.208.167 ::: serverIP=254.141.105.58 ::: userName=nighthawk ::: created_at=2022-05-12T14:15:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T14:15:29.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"122.80.208.167","externalIp":"254.141.105.58","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-12T14:15:29.000Z"} ::: clientIP=122.80.208.167 ::: serverIP=254.141.105.58 ::: userName=nighthawk ::: created_at=2022-05-12T14:15:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T14:15:29.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T14:15:29.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 122.80.208.167
serverIP: 254.141.105.58
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"52.127.224.136","externalIp":"192.2.30.198","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-12T14:15:29.000Z"} ::: clientIP=52.127.224.136 ::: serverIP=192.2.30.198 ::: userName=fish ::: created_at=2022-05-12T14:15:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T14:15:29.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T14:15:29.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"52.127.224.136\",\"externalIp\":\"192.2.30.198\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T14:15:29.000Z\"} ::: clientIP=52.127.224.136 ::: serverIP=192.2.30.198 ::: userName=fish ::: created_at=2022-05-12T14:15:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T14:15:29.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "52.127.224.136",
"serverIP": "192.2.30.198",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"52.127.224.136","externalIp":"192.2.30.198","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-12T14:15:29.000Z"} ::: clientIP=52.127.224.136 ::: serverIP=192.2.30.198 ::: userName=fish ::: created_at=2022-05-12T14:15:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T14:15:29.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"52.127.224.136","externalIp":"192.2.30.198","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-12T14:15:29.000Z"} ::: clientIP=52.127.224.136 ::: serverIP=192.2.30.198 ::: userName=fish ::: created_at=2022-05-12T14:15:29.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T14:15:29.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T14:15:29.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 52.127.224.136
serverIP: 192.2.30.198
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"91.34.222.4","externalIp":"91.34.222.4","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=91.34.222.4 ::: serverIP=91.34.222.4 ::: userName=janedoe ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T18:04:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"91.34.222.4\",\"externalIp\":\"91.34.222.4\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T18:04:37.000Z\"} ::: clientIP=91.34.222.4 ::: serverIP=91.34.222.4 ::: userName=janedoe ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "91.34.222.4",
"serverIP": "124.170.78.36",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"91.34.222.4","externalIp":"91.34.222.4","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=91.34.222.4 ::: serverIP=91.34.222.4 ::: userName=janedoe ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"91.34.222.4","externalIp":"91.34.222.4","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=91.34.222.4 ::: serverIP=91.34.222.4 ::: userName=janedoe ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T18:04:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 91.34.222.4
serverIP: 124.170.78.36
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"121.216.153.165","externalIp":"121.216.153.165","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=121.216.153.165 ::: serverIP=121.216.153.165 ::: userName=charlie ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T18:04:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"121.216.153.165\",\"externalIp\":\"121.216.153.165\",\"categories\":[\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T18:04:37.000Z\"} ::: clientIP=121.216.153.165 ::: serverIP=121.216.153.165 ::: userName=charlie ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "MalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "121.216.153.165",
"serverIP": "246.14.168.67",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"121.216.153.165","externalIp":"121.216.153.165","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=121.216.153.165 ::: serverIP=121.216.153.165 ::: userName=charlie ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"121.216.153.165","externalIp":"121.216.153.165","categories":["Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T18:04:37.000Z"} ::: clientIP=121.216.153.165 ::: serverIP=121.216.153.165 ::: userName=charlie ::: created_at=2022-05-12T18:04:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T18:04:37.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T18:04:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: MalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 121.216.153.165
serverIP: 246.14.168.67
userName: charlie | Explain this syslog message |
<185>Aug 22 20:09:50 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=78.113.238.9 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=140.21.233.226 spt=45202 requestMethod=GET app=HTTP requestContext="-" start=Aug 22 2022 20:09:50 rt=1661216990550 request=/ requestClientApplication="python-requests/2.28.1" dvchost=WAFirewall externalId=182c83fa543-9c71267 cn2=45202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.21.233.226 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:130.211.54.158",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 22 20:09:50 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=78.113.238.9 dpt=80 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=140.21.233.226 spt=45202 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 22 2022 20:09:50 rt=1661216990550 request=/ requestClientApplication=\"python-requests/2.28.1\" dvchost=WAFirewall externalId=182c83fa543-9c71267 cn2=45202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.21.233.226 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661216990550 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 45202,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "140.21.233.226",
"serverIP": "78.113.238.9",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 22 20:09:50 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=78.113.238.9 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=140.21.233.226 spt=45202 requestMethod=GET app=HTTP requestContext="-" start=Aug 22 2022 20:09:50 rt=1661216990550 request=/ requestClientApplication="python-requests/2.28.1" dvchost=WAFirewall externalId=182c83fa543-9c71267 cn2=45202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.21.233.226 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 22 20:09:50 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=78.113.238.9 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=140.21.233.226 spt=45202 requestMethod=GET app=HTTP requestContext="-" start=Aug 22 2022 20:09:50 rt=1661216990550 request=/ requestClientApplication="python-requests/2.28.1" dvchost=WAFirewall externalId=182c83fa543-9c71267 cn2=45202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=140.21.233.226 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:130.211.54.158', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661216990550
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 45202
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 140.21.233.226
serverIP: 78.113.238.9
userName: - | Explain this syslog message |
<185>Aug 22 20:09:50 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=0.253.124.187 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=201.170.55.116 spt=45202 requestMethod=GET app=HTTP requestContext="-" start=Aug 22 2022 20:09:50 rt=1661216990550 request=/ requestClientApplication="python-requests/2.28.1" dvchost=WAFirewall externalId=182c83fa543-9c71267 cn2=45202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.170.55.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:130.211.54.158",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 22 20:09:50 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=0.253.124.187 dpt=80 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=201.170.55.116 spt=45202 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 22 2022 20:09:50 rt=1661216990550 request=/ requestClientApplication=\"python-requests/2.28.1\" dvchost=WAFirewall externalId=182c83fa543-9c71267 cn2=45202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.170.55.116 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661216990550 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 45202,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "201.170.55.116",
"serverIP": "0.253.124.187",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 22 20:09:50 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=0.253.124.187 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=201.170.55.116 spt=45202 requestMethod=GET app=HTTP requestContext="-" start=Aug 22 2022 20:09:50 rt=1661216990550 request=/ requestClientApplication="python-requests/2.28.1" dvchost=WAFirewall externalId=182c83fa543-9c71267 cn2=45202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.170.55.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 22 20:09:50 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=0.253.124.187 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=201.170.55.116 spt=45202 requestMethod=GET app=HTTP requestContext="-" start=Aug 22 2022 20:09:50 rt=1661216990550 request=/ requestClientApplication="python-requests/2.28.1" dvchost=WAFirewall externalId=182c83fa543-9c71267 cn2=45202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.170.55.116 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:130.211.54.158', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661216990550
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 45202
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 201.170.55.116
serverIP: 0.253.124.187
userName: - | Explain this syslog message |
<185>Aug 22 20:09:50 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=39.2.141.27 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=31.170.23.122 spt=45202 requestMethod=GET app=HTTP requestContext="-" start=Aug 22 2022 20:09:50 rt=1661216990550 request=/ requestClientApplication="python-requests/2.28.1" dvchost=WAFirewall externalId=182c83fa543-9c71267 cn2=45202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=31.170.23.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:130.211.54.158",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 22 20:09:50 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=39.2.141.27 dpt=80 act=DENY msg=[Known Http Attack Source] duser=\"-\" src=31.170.23.122 spt=45202 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 22 2022 20:09:50 rt=1661216990550 request=/ requestClientApplication=\"python-requests/2.28.1\" dvchost=WAFirewall externalId=182c83fa543-9c71267 cn2=45202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=31.170.23.122 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661216990550 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 45202,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "31.170.23.122",
"serverIP": "39.2.141.27",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 22 20:09:50 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=39.2.141.27 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=31.170.23.122 spt=45202 requestMethod=GET app=HTTP requestContext="-" start=Aug 22 2022 20:09:50 rt=1661216990550 request=/ requestClientApplication="python-requests/2.28.1" dvchost=WAFirewall externalId=182c83fa543-9c71267 cn2=45202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=31.170.23.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 22 20:09:50 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=39.2.141.27 dpt=80 act=DENY msg=[Known Http Attack Source] duser="-" src=31.170.23.122 spt=45202 requestMethod=GET app=HTTP requestContext="-" start=Aug 22 2022 20:09:50 rt=1661216990550 request=/ requestClientApplication="python-requests/2.28.1" dvchost=WAFirewall externalId=182c83fa543-9c71267 cn2=45202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=31.170.23.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:130.211.54.158', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1661216990550
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 45202
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 31.170.23.122
serverIP: 39.2.141.27
userName: - | Explain this syslog message |
<185>Jun 19 19:37:33 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=106.113.156.78 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=101.131.245.210 spt=55184 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/mytag_js.php?aid=9999 start=Jun 19 2024 19:37:33 rt=1718843853937 request=//plus/mytag_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313cc3f-46a6e6e0 cn2=55184 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=101.131.245.210 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55184,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "//plus/mytag_js.php",
"localhostname": "WAFirewall",
"localstarttime": "1718843853937 ",
"message": "<185>Jun 19 19:37:33 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=106.113.156.78 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-cast-simple\" token\\=\"(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(\" Parameter\\=\"lemon\" value\\=\"@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1\"] duser=\"-\" src=101.131.245.210 spt=55184 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/mytag_js.php?aid=9999 start=Jun 19 2024 19:37:33 rt=1718843853937 request=//plus/mytag_js.php requestClientApplication=\"Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)\" dvchost=WAFirewall externalId=1903313cc3f-46a6e6e0 cn2=55184 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=101.131.245.210 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleType:GLOBAL",
"ProxyIP:209.141.47.98",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "101.131.245.210",
"serverIP": "106.113.156.78",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 19 19:37:33 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=106.113.156.78 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=101.131.245.210 spt=55184 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/mytag_js.php?aid=9999 start=Jun 19 2024 19:37:33 rt=1718843853937 request=//plus/mytag_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313cc3f-46a6e6e0 cn2=55184 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=101.131.245.210 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 19 19:37:33 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=106.113.156.78 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=101.131.245.210 spt=55184 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/mytag_js.php?aid=9999 start=Jun 19 2024 19:37:33 rt=1718843853937 request=//plus/mytag_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313cc3f-46a6e6e0 cn2=55184 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=101.131.245.210 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55184
facilitycode: 23
facilitylabel: local7
fqdn: //plus/mytag_js.php
localhostname: WAFirewall
localstarttime: 1718843853937
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleType:GLOBAL', 'ProxyIP:209.141.47.98', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 101.131.245.210
serverIP: 106.113.156.78
userName: - | Explain this syslog message |
<185>Jun 19 19:37:33 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=187.71.147.152 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=66.102.16.103 spt=55184 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/mytag_js.php?aid=9999 start=Jun 19 2024 19:37:33 rt=1718843853937 request=//plus/mytag_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313cc3f-46a6e6e0 cn2=55184 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=66.102.16.103 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55184,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "//plus/mytag_js.php",
"localhostname": "WAFirewall",
"localstarttime": "1718843853937 ",
"message": "<185>Jun 19 19:37:33 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=187.71.147.152 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-cast-simple\" token\\=\"(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(\" Parameter\\=\"lemon\" value\\=\"@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1\"] duser=\"-\" src=66.102.16.103 spt=55184 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/mytag_js.php?aid=9999 start=Jun 19 2024 19:37:33 rt=1718843853937 request=//plus/mytag_js.php requestClientApplication=\"Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)\" dvchost=WAFirewall externalId=1903313cc3f-46a6e6e0 cn2=55184 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=66.102.16.103 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleType:GLOBAL",
"ProxyIP:209.141.47.98",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "66.102.16.103",
"serverIP": "187.71.147.152",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 19 19:37:33 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=187.71.147.152 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=66.102.16.103 spt=55184 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/mytag_js.php?aid=9999 start=Jun 19 2024 19:37:33 rt=1718843853937 request=//plus/mytag_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313cc3f-46a6e6e0 cn2=55184 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=66.102.16.103 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 19 19:37:33 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=187.71.147.152 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=66.102.16.103 spt=55184 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/mytag_js.php?aid=9999 start=Jun 19 2024 19:37:33 rt=1718843853937 request=//plus/mytag_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313cc3f-46a6e6e0 cn2=55184 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=66.102.16.103 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55184
facilitycode: 23
facilitylabel: local7
fqdn: //plus/mytag_js.php
localhostname: WAFirewall
localstarttime: 1718843853937
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleType:GLOBAL', 'ProxyIP:209.141.47.98', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 66.102.16.103
serverIP: 187.71.147.152
userName: - | Explain this syslog message |
<185>Jun 19 19:37:33 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=106.117.152.41 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=33.194.247.124 spt=55184 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/mytag_js.php?aid=9999 start=Jun 19 2024 19:37:33 rt=1718843853937 request=//plus/mytag_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313cc3f-46a6e6e0 cn2=55184 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=33.194.247.124 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55184,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "//plus/mytag_js.php",
"localhostname": "WAFirewall",
"localstarttime": "1718843853937 ",
"message": "<185>Jun 19 19:37:33 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=106.117.152.41 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-cast-simple\" token\\=\"(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(\" Parameter\\=\"lemon\" value\\=\"@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1\"] duser=\"-\" src=33.194.247.124 spt=55184 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/mytag_js.php?aid=9999 start=Jun 19 2024 19:37:33 rt=1718843853937 request=//plus/mytag_js.php requestClientApplication=\"Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)\" dvchost=WAFirewall externalId=1903313cc3f-46a6e6e0 cn2=55184 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=33.194.247.124 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleType:GLOBAL",
"ProxyIP:209.141.47.98",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "33.194.247.124",
"serverIP": "106.117.152.41",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 19 19:37:33 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=106.117.152.41 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=33.194.247.124 spt=55184 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/mytag_js.php?aid=9999 start=Jun 19 2024 19:37:33 rt=1718843853937 request=//plus/mytag_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313cc3f-46a6e6e0 cn2=55184 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=33.194.247.124 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 19 19:37:33 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=106.117.152.41 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=33.194.247.124 spt=55184 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/mytag_js.php?aid=9999 start=Jun 19 2024 19:37:33 rt=1718843853937 request=//plus/mytag_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313cc3f-46a6e6e0 cn2=55184 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=33.194.247.124 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55184
facilitycode: 23
facilitylabel: local7
fqdn: //plus/mytag_js.php
localhostname: WAFirewall
localstarttime: 1718843853937
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleType:GLOBAL', 'ProxyIP:209.141.47.98', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 33.194.247.124
serverIP: 106.117.152.41
userName: - | Explain this syslog message |
<185>Jun 19 19:37:31 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=183.4.98.159 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="x" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(101)."] duser="-" src=232.233.171.152 spt=55099 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/laobiao.php start=Jun 19 2024 19:37:31 rt=1718843851634 request=//plus/laobiao.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313c340-479eed9e cn2=55099 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=232.233.171.152 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55099,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "//plus/laobiao.php",
"localhostname": "WAFirewall",
"localstarttime": "1718843851634 ",
"message": "<185>Jun 19 19:37:31 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=183.4.98.159 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-cast-simple\" token\\=\"(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(\" Parameter\\=\"x\" value\\=\"@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(101).\"] duser=\"-\" src=232.233.171.152 spt=55099 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/laobiao.php start=Jun 19 2024 19:37:31 rt=1718843851634 request=//plus/laobiao.php requestClientApplication=\"Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)\" dvchost=WAFirewall externalId=1903313c340-479eed9e cn2=55099 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=232.233.171.152 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleType:GLOBAL",
"ProxyIP:209.141.47.98",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "232.233.171.152",
"serverIP": "183.4.98.159",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 19 19:37:31 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=183.4.98.159 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="x" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(101)."] duser="-" src=232.233.171.152 spt=55099 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/laobiao.php start=Jun 19 2024 19:37:31 rt=1718843851634 request=//plus/laobiao.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313c340-479eed9e cn2=55099 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=232.233.171.152 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 19 19:37:31 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=183.4.98.159 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="x" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(101)."] duser="-" src=232.233.171.152 spt=55099 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/laobiao.php start=Jun 19 2024 19:37:31 rt=1718843851634 request=//plus/laobiao.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313c340-479eed9e cn2=55099 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=232.233.171.152 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55099
facilitycode: 23
facilitylabel: local7
fqdn: //plus/laobiao.php
localhostname: WAFirewall
localstarttime: 1718843851634
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleType:GLOBAL', 'ProxyIP:209.141.47.98', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 232.233.171.152
serverIP: 183.4.98.159
userName: - | Explain this syslog message |
<185>Jun 19 19:37:31 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=88.151.152.159 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="x" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(101)."] duser="-" src=37.4.198.90 spt=55099 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/laobiao.php start=Jun 19 2024 19:37:31 rt=1718843851634 request=//plus/laobiao.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313c340-479eed9e cn2=55099 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=37.4.198.90 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55099,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "//plus/laobiao.php",
"localhostname": "WAFirewall",
"localstarttime": "1718843851634 ",
"message": "<185>Jun 19 19:37:31 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=88.151.152.159 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-cast-simple\" token\\=\"(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(\" Parameter\\=\"x\" value\\=\"@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(101).\"] duser=\"-\" src=37.4.198.90 spt=55099 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/laobiao.php start=Jun 19 2024 19:37:31 rt=1718843851634 request=//plus/laobiao.php requestClientApplication=\"Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)\" dvchost=WAFirewall externalId=1903313c340-479eed9e cn2=55099 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=37.4.198.90 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleType:GLOBAL",
"ProxyIP:209.141.47.98",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "37.4.198.90",
"serverIP": "88.151.152.159",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 19 19:37:31 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=88.151.152.159 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="x" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(101)."] duser="-" src=37.4.198.90 spt=55099 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/laobiao.php start=Jun 19 2024 19:37:31 rt=1718843851634 request=//plus/laobiao.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313c340-479eed9e cn2=55099 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=37.4.198.90 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 19 19:37:31 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=88.151.152.159 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="x" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(101)."] duser="-" src=37.4.198.90 spt=55099 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/laobiao.php start=Jun 19 2024 19:37:31 rt=1718843851634 request=//plus/laobiao.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313c340-479eed9e cn2=55099 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=37.4.198.90 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55099
facilitycode: 23
facilitylabel: local7
fqdn: //plus/laobiao.php
localhostname: WAFirewall
localstarttime: 1718843851634
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleType:GLOBAL', 'ProxyIP:209.141.47.98', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 37.4.198.90
serverIP: 88.151.152.159
userName: - | Explain this syslog message |
<185>Jun 19 19:37:31 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=67.92.108.183 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="x" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(101)."] duser="-" src=119.40.240.192 spt=55099 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/laobiao.php start=Jun 19 2024 19:37:31 rt=1718843851634 request=//plus/laobiao.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313c340-479eed9e cn2=55099 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=119.40.240.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55099,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "//plus/laobiao.php",
"localhostname": "WAFirewall",
"localstarttime": "1718843851634 ",
"message": "<185>Jun 19 19:37:31 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=67.92.108.183 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-cast-simple\" token\\=\"(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(\" Parameter\\=\"x\" value\\=\"@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(101).\"] duser=\"-\" src=119.40.240.192 spt=55099 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/laobiao.php start=Jun 19 2024 19:37:31 rt=1718843851634 request=//plus/laobiao.php requestClientApplication=\"Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)\" dvchost=WAFirewall externalId=1903313c340-479eed9e cn2=55099 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=119.40.240.192 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleType:GLOBAL",
"ProxyIP:209.141.47.98",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "119.40.240.192",
"serverIP": "67.92.108.183",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 19 19:37:31 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=67.92.108.183 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="x" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(101)."] duser="-" src=119.40.240.192 spt=55099 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/laobiao.php start=Jun 19 2024 19:37:31 rt=1718843851634 request=//plus/laobiao.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313c340-479eed9e cn2=55099 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=119.40.240.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 19 19:37:31 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=67.92.108.183 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="x" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(101)."] duser="-" src=119.40.240.192 spt=55099 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/laobiao.php start=Jun 19 2024 19:37:31 rt=1718843851634 request=//plus/laobiao.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313c340-479eed9e cn2=55099 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=119.40.240.192 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55099
facilitycode: 23
facilitylabel: local7
fqdn: //plus/laobiao.php
localhostname: WAFirewall
localstarttime: 1718843851634
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleType:GLOBAL', 'ProxyIP:209.141.47.98', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 119.40.240.192
serverIP: 67.92.108.183
userName: - | Explain this syslog message |
<185>Jun 19 19:37:20 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=144.148.178.191 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=71.179.213.127 spt=54817 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/ad_js.php?aid=8888 start=Jun 19 2024 19:37:20 rt=1718843840230 request=//plus/ad_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313969a-11a5b2a0 cn2=54817 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=71.179.213.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54817,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "//plus/ad_js.php",
"localhostname": "WAFirewall",
"localstarttime": "1718843840230 ",
"message": "<185>Jun 19 19:37:20 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=144.148.178.191 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-cast-simple\" token\\=\"(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(\" Parameter\\=\"lemon\" value\\=\"@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1\"] duser=\"-\" src=71.179.213.127 spt=54817 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/ad_js.php?aid=8888 start=Jun 19 2024 19:37:20 rt=1718843840230 request=//plus/ad_js.php requestClientApplication=\"Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)\" dvchost=WAFirewall externalId=1903313969a-11a5b2a0 cn2=54817 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=71.179.213.127 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleType:GLOBAL",
"ProxyIP:209.141.47.98",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "71.179.213.127",
"serverIP": "144.148.178.191",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 19 19:37:20 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=144.148.178.191 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=71.179.213.127 spt=54817 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/ad_js.php?aid=8888 start=Jun 19 2024 19:37:20 rt=1718843840230 request=//plus/ad_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313969a-11a5b2a0 cn2=54817 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=71.179.213.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 19 19:37:20 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=144.148.178.191 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=71.179.213.127 spt=54817 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/ad_js.php?aid=8888 start=Jun 19 2024 19:37:20 rt=1718843840230 request=//plus/ad_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313969a-11a5b2a0 cn2=54817 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=71.179.213.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54817
facilitycode: 23
facilitylabel: local7
fqdn: //plus/ad_js.php
localhostname: WAFirewall
localstarttime: 1718843840230
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleType:GLOBAL', 'ProxyIP:209.141.47.98', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 71.179.213.127
serverIP: 144.148.178.191
userName: - | Explain this syslog message |
<185>Jun 19 19:37:20 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=166.192.150.20 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=45.63.220.200 spt=54817 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/ad_js.php?aid=8888 start=Jun 19 2024 19:37:20 rt=1718843840230 request=//plus/ad_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313969a-11a5b2a0 cn2=54817 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=45.63.220.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54817,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "//plus/ad_js.php",
"localhostname": "WAFirewall",
"localstarttime": "1718843840230 ",
"message": "<185>Jun 19 19:37:20 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=166.192.150.20 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-cast-simple\" token\\=\"(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(\" Parameter\\=\"lemon\" value\\=\"@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1\"] duser=\"-\" src=45.63.220.200 spt=54817 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/ad_js.php?aid=8888 start=Jun 19 2024 19:37:20 rt=1718843840230 request=//plus/ad_js.php requestClientApplication=\"Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)\" dvchost=WAFirewall externalId=1903313969a-11a5b2a0 cn2=54817 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=45.63.220.200 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleType:GLOBAL",
"ProxyIP:209.141.47.98",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "45.63.220.200",
"serverIP": "166.192.150.20",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 19 19:37:20 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=166.192.150.20 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=45.63.220.200 spt=54817 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/ad_js.php?aid=8888 start=Jun 19 2024 19:37:20 rt=1718843840230 request=//plus/ad_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313969a-11a5b2a0 cn2=54817 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=45.63.220.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 19 19:37:20 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=166.192.150.20 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=45.63.220.200 spt=54817 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/ad_js.php?aid=8888 start=Jun 19 2024 19:37:20 rt=1718843840230 request=//plus/ad_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313969a-11a5b2a0 cn2=54817 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=45.63.220.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54817
facilitycode: 23
facilitylabel: local7
fqdn: //plus/ad_js.php
localhostname: WAFirewall
localstarttime: 1718843840230
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleType:GLOBAL', 'ProxyIP:209.141.47.98', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 45.63.220.200
serverIP: 166.192.150.20
userName: - | Explain this syslog message |
<185>Jun 19 19:37:20 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=168.18.135.132 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=123.226.235.206 spt=54817 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/ad_js.php?aid=8888 start=Jun 19 2024 19:37:20 rt=1718843840230 request=//plus/ad_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313969a-11a5b2a0 cn2=54817 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=123.226.235.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54817,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "//plus/ad_js.php",
"localhostname": "WAFirewall",
"localstarttime": "1718843840230 ",
"message": "<185>Jun 19 19:37:20 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=168.18.135.132 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-cast-simple\" token\\=\"(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(\" Parameter\\=\"lemon\" value\\=\"@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1\"] duser=\"-\" src=123.226.235.206 spt=54817 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/ad_js.php?aid=8888 start=Jun 19 2024 19:37:20 rt=1718843840230 request=//plus/ad_js.php requestClientApplication=\"Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)\" dvchost=WAFirewall externalId=1903313969a-11a5b2a0 cn2=54817 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=123.226.235.206 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleType:GLOBAL",
"ProxyIP:209.141.47.98",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "123.226.235.206",
"serverIP": "168.18.135.132",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 19 19:37:20 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=168.18.135.132 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=123.226.235.206 spt=54817 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/ad_js.php?aid=8888 start=Jun 19 2024 19:37:20 rt=1718843840230 request=//plus/ad_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313969a-11a5b2a0 cn2=54817 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=123.226.235.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 19 19:37:20 WAFirewall CEF:0|Barracuda|WAF|1220|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=168.18.135.132 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-cast-simple" token\="(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(" Parameter\="lemon" value\="@eVAl(Chr(64).Chr(105).Chr(110).Chr(105).Chr(95).Chr(115).Chr(1"] duser="-" src=123.226.235.206 spt=54817 requestMethod=POST app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//plus/ad_js.php?aid=8888 start=Jun 19 2024 19:37:20 rt=1718843840230 request=//plus/ad_js.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=1903313969a-11a5b2a0 cn2=54817 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=123.226.235.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54817
facilitycode: 23
facilitylabel: local7
fqdn: //plus/ad_js.php
localhostname: WAFirewall
localstarttime: 1718843840230
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleType:GLOBAL', 'ProxyIP:209.141.47.98', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 123.226.235.206
serverIP: 168.18.135.132
userName: - | Explain this syslog message |
<185>Jun 19 19:38:10 WAFirewall CEF:0|Barracuda|WAF|1220|159|OS_CMD_INJECTION_IN_PARAM|1|cat=WF dst=205.122.158.121 dpt=443 act=DENY msg=[type\="os-command-injection" pattern\="unix-shell-command-substrings" token\="@eval($_POST\\['hm147258'\\])" Parameter\="vars\\[1\\]\\[1\\]" value\="<?php @eval($_POST\\['hm147258'\\]);?>"] duser="-" src=110.0.186.62 spt=55957 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//index.php?s=index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=file_p start=Jun 19 2024 19:38:10 rt=1718843890775 request=//index.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=19033145c57-42a6c9e1 cn2=55957 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=110.0.186.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55957,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "//index.php",
"localhostname": "WAFirewall",
"localstarttime": "1718843890775 ",
"message": "<185>Jun 19 19:38:10 WAFirewall CEF:0|Barracuda|WAF|1220|159|OS_CMD_INJECTION_IN_PARAM|1|cat=WF dst=205.122.158.121 dpt=443 act=DENY msg=[type\\=\"os-command-injection\" pattern\\=\"unix-shell-command-substrings\" token\\=\"@eval($_POST\\\\['hm147258'\\\\])\" Parameter\\=\"vars\\\\[1\\\\]\\\\[1\\\\]\" value\\=\"<?php @eval($_POST\\\\['hm147258'\\\\]);?>\"] duser=\"-\" src=110.0.186.62 spt=55957 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//index.php?s=index/\\\\think\\\\app/invokefunction&function=call_user_func_array&vars[0]=file_p start=Jun 19 2024 19:38:10 rt=1718843890775 request=//index.php requestClientApplication=\"Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)\" dvchost=WAFirewall externalId=19033145c57-42a6c9e1 cn2=55957 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=110.0.186.62 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "OS_CMD_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_OS_CMD_INJECTION_IN_PARAM",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"OS_CMD_INJECTION_IN_PARAM",
"RuleType:GLOBAL",
"ProxyIP:209.141.47.98",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "159",
"streamName": "barracuda_waf",
"clientIP": "110.0.186.62",
"serverIP": "205.122.158.121",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 19 19:38:10 WAFirewall CEF:0|Barracuda|WAF|1220|159|OS_CMD_INJECTION_IN_PARAM|1|cat=WF dst=205.122.158.121 dpt=443 act=DENY msg=[type\="os-command-injection" pattern\="unix-shell-command-substrings" token\="@eval($_POST\\['hm147258'\\])" Parameter\="vars\\[1\\]\\[1\\]" value\="<?php @eval($_POST\\['hm147258'\\]);?>"] duser="-" src=110.0.186.62 spt=55957 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//index.php?s=index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=file_p start=Jun 19 2024 19:38:10 rt=1718843890775 request=//index.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=19033145c57-42a6c9e1 cn2=55957 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=110.0.186.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 19 19:38:10 WAFirewall CEF:0|Barracuda|WAF|1220|159|OS_CMD_INJECTION_IN_PARAM|1|cat=WF dst=205.122.158.121 dpt=443 act=DENY msg=[type\="os-command-injection" pattern\="unix-shell-command-substrings" token\="@eval($_POST\\['hm147258'\\])" Parameter\="vars\\[1\\]\\[1\\]" value\="<?php @eval($_POST\\['hm147258'\\]);?>"] duser="-" src=110.0.186.62 spt=55957 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//index.php?s=index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=file_p start=Jun 19 2024 19:38:10 rt=1718843890775 request=//index.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=19033145c57-42a6c9e1 cn2=55957 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=110.0.186.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55957
facilitycode: 23
facilitylabel: local7
fqdn: //index.php
localhostname: WAFirewall
localstarttime: 1718843890775
messagetype: OS_CMD_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_OS_CMD_INJECTION_IN_PARAM', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'OS_CMD_INJECTION_IN_PARAM', 'RuleType:GLOBAL', 'ProxyIP:209.141.47.98', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 159
streamName: barracuda_waf
clientIP: 110.0.186.62
serverIP: 205.122.158.121
userName: - | Explain this syslog message |
<185>Jun 19 19:38:10 WAFirewall CEF:0|Barracuda|WAF|1220|159|OS_CMD_INJECTION_IN_PARAM|1|cat=WF dst=81.100.223.115 dpt=443 act=DENY msg=[type\="os-command-injection" pattern\="unix-shell-command-substrings" token\="@eval($_POST\\['hm147258'\\])" Parameter\="vars\\[1\\]\\[1\\]" value\="<?php @eval($_POST\\['hm147258'\\]);?>"] duser="-" src=207.167.44.8 spt=55957 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//index.php?s=index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=file_p start=Jun 19 2024 19:38:10 rt=1718843890775 request=//index.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=19033145c57-42a6c9e1 cn2=55957 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=207.167.44.8 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55957,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "//index.php",
"localhostname": "WAFirewall",
"localstarttime": "1718843890775 ",
"message": "<185>Jun 19 19:38:10 WAFirewall CEF:0|Barracuda|WAF|1220|159|OS_CMD_INJECTION_IN_PARAM|1|cat=WF dst=81.100.223.115 dpt=443 act=DENY msg=[type\\=\"os-command-injection\" pattern\\=\"unix-shell-command-substrings\" token\\=\"@eval($_POST\\\\['hm147258'\\\\])\" Parameter\\=\"vars\\\\[1\\\\]\\\\[1\\\\]\" value\\=\"<?php @eval($_POST\\\\['hm147258'\\\\]);?>\"] duser=\"-\" src=207.167.44.8 spt=55957 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//index.php?s=index/\\\\think\\\\app/invokefunction&function=call_user_func_array&vars[0]=file_p start=Jun 19 2024 19:38:10 rt=1718843890775 request=//index.php requestClientApplication=\"Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)\" dvchost=WAFirewall externalId=19033145c57-42a6c9e1 cn2=55957 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=207.167.44.8 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "OS_CMD_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_OS_CMD_INJECTION_IN_PARAM",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"OS_CMD_INJECTION_IN_PARAM",
"RuleType:GLOBAL",
"ProxyIP:209.141.47.98",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "159",
"streamName": "barracuda_waf",
"clientIP": "207.167.44.8",
"serverIP": "81.100.223.115",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 19 19:38:10 WAFirewall CEF:0|Barracuda|WAF|1220|159|OS_CMD_INJECTION_IN_PARAM|1|cat=WF dst=81.100.223.115 dpt=443 act=DENY msg=[type\="os-command-injection" pattern\="unix-shell-command-substrings" token\="@eval($_POST\\['hm147258'\\])" Parameter\="vars\\[1\\]\\[1\\]" value\="<?php @eval($_POST\\['hm147258'\\]);?>"] duser="-" src=207.167.44.8 spt=55957 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//index.php?s=index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=file_p start=Jun 19 2024 19:38:10 rt=1718843890775 request=//index.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=19033145c57-42a6c9e1 cn2=55957 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=207.167.44.8 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 19 19:38:10 WAFirewall CEF:0|Barracuda|WAF|1220|159|OS_CMD_INJECTION_IN_PARAM|1|cat=WF dst=81.100.223.115 dpt=443 act=DENY msg=[type\="os-command-injection" pattern\="unix-shell-command-substrings" token\="@eval($_POST\\['hm147258'\\])" Parameter\="vars\\[1\\]\\[1\\]" value\="<?php @eval($_POST\\['hm147258'\\]);?>"] duser="-" src=207.167.44.8 spt=55957 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//index.php?s=index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=file_p start=Jun 19 2024 19:38:10 rt=1718843890775 request=//index.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=19033145c57-42a6c9e1 cn2=55957 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=207.167.44.8 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55957
facilitycode: 23
facilitylabel: local7
fqdn: //index.php
localhostname: WAFirewall
localstarttime: 1718843890775
messagetype: OS_CMD_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_OS_CMD_INJECTION_IN_PARAM', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'OS_CMD_INJECTION_IN_PARAM', 'RuleType:GLOBAL', 'ProxyIP:209.141.47.98', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 159
streamName: barracuda_waf
clientIP: 207.167.44.8
serverIP: 81.100.223.115
userName: - | Explain this syslog message |
<185>Jun 19 19:38:10 WAFirewall CEF:0|Barracuda|WAF|1220|159|OS_CMD_INJECTION_IN_PARAM|1|cat=WF dst=192.64.120.172 dpt=443 act=DENY msg=[type\="os-command-injection" pattern\="unix-shell-command-substrings" token\="@eval($_POST\\['hm147258'\\])" Parameter\="vars\\[1\\]\\[1\\]" value\="<?php @eval($_POST\\['hm147258'\\]);?>"] duser="-" src=108.112.250.93 spt=55957 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//index.php?s=index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=file_p start=Jun 19 2024 19:38:10 rt=1718843890775 request=//index.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=19033145c57-42a6c9e1 cn2=55957 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=108.112.250.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55957,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "//index.php",
"localhostname": "WAFirewall",
"localstarttime": "1718843890775 ",
"message": "<185>Jun 19 19:38:10 WAFirewall CEF:0|Barracuda|WAF|1220|159|OS_CMD_INJECTION_IN_PARAM|1|cat=WF dst=192.64.120.172 dpt=443 act=DENY msg=[type\\=\"os-command-injection\" pattern\\=\"unix-shell-command-substrings\" token\\=\"@eval($_POST\\\\['hm147258'\\\\])\" Parameter\\=\"vars\\\\[1\\\\]\\\\[1\\\\]\" value\\=\"<?php @eval($_POST\\\\['hm147258'\\\\]);?>\"] duser=\"-\" src=108.112.250.93 spt=55957 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//index.php?s=index/\\\\think\\\\app/invokefunction&function=call_user_func_array&vars[0]=file_p start=Jun 19 2024 19:38:10 rt=1718843890775 request=//index.php requestClientApplication=\"Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)\" dvchost=WAFirewall externalId=19033145c57-42a6c9e1 cn2=55957 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=108.112.250.93 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "OS_CMD_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"barracuda_waf_OS_CMD_INJECTION_IN_PARAM",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"OS_CMD_INJECTION_IN_PARAM",
"RuleType:GLOBAL",
"ProxyIP:209.141.47.98",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "159",
"streamName": "barracuda_waf",
"clientIP": "108.112.250.93",
"serverIP": "192.64.120.172",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 19 19:38:10 WAFirewall CEF:0|Barracuda|WAF|1220|159|OS_CMD_INJECTION_IN_PARAM|1|cat=WF dst=192.64.120.172 dpt=443 act=DENY msg=[type\="os-command-injection" pattern\="unix-shell-command-substrings" token\="@eval($_POST\\['hm147258'\\])" Parameter\="vars\\[1\\]\\[1\\]" value\="<?php @eval($_POST\\['hm147258'\\]);?>"] duser="-" src=108.112.250.93 spt=55957 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//index.php?s=index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=file_p start=Jun 19 2024 19:38:10 rt=1718843890775 request=//index.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=19033145c57-42a6c9e1 cn2=55957 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=108.112.250.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 19 19:38:10 WAFirewall CEF:0|Barracuda|WAF|1220|159|OS_CMD_INJECTION_IN_PARAM|1|cat=WF dst=192.64.120.172 dpt=443 act=DENY msg=[type\="os-command-injection" pattern\="unix-shell-command-substrings" token\="@eval($_POST\\['hm147258'\\])" Parameter\="vars\\[1\\]\\[1\\]" value\="<?php @eval($_POST\\['hm147258'\\]);?>"] duser="-" src=108.112.250.93 spt=55957 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org//index.php?s=index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=file_p start=Jun 19 2024 19:38:10 rt=1718843890775 request=//index.php requestClientApplication="Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" dvchost=WAFirewall externalId=19033145c57-42a6c9e1 cn2=55957 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=108.112.250.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55957
facilitycode: 23
facilitylabel: local7
fqdn: //index.php
localhostname: WAFirewall
localstarttime: 1718843890775
messagetype: OS_CMD_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['barracuda_waf_OS_CMD_INJECTION_IN_PARAM', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'OS_CMD_INJECTION_IN_PARAM', 'RuleType:GLOBAL', 'ProxyIP:209.141.47.98', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 159
streamName: barracuda_waf
clientIP: 108.112.250.93
serverIP: 192.64.120.172
userName: - | Explain this syslog message |
<185>Aug 30 18:34:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.151.101.206 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=134.41.64.206 spt=36361 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:34:48 rt=1693438488386 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48ccaf25-e0fda0de cn2=36361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=134.41.64.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 36361,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1693438488386 ",
"message": "<185>Aug 30 18:34:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.151.101.206 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=134.41.64.206 spt=36361 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 30 2023 18:34:48 rt=1693438488386 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36\" dvchost=WAFirewall externalId=18a48ccaf25-e0fda0de cn2=36361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=134.41.64.206 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:193.221.197.255",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "134.41.64.206",
"serverIP": "121.151.101.206",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 30 18:34:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.151.101.206 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=134.41.64.206 spt=36361 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:34:48 rt=1693438488386 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48ccaf25-e0fda0de cn2=36361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=134.41.64.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 30 18:34:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.151.101.206 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=134.41.64.206 spt=36361 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:34:48 rt=1693438488386 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48ccaf25-e0fda0de cn2=36361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=134.41.64.206 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 36361
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1693438488386
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:193.221.197.255', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 134.41.64.206
serverIP: 121.151.101.206
userName: - | Explain this syslog message |
<185>Aug 30 18:34:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=164.73.2.68 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=127.245.136.198 spt=36361 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:34:48 rt=1693438488386 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48ccaf25-e0fda0de cn2=36361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=127.245.136.198 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 36361,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1693438488386 ",
"message": "<185>Aug 30 18:34:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=164.73.2.68 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=127.245.136.198 spt=36361 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 30 2023 18:34:48 rt=1693438488386 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36\" dvchost=WAFirewall externalId=18a48ccaf25-e0fda0de cn2=36361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=127.245.136.198 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:193.221.197.255",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "127.245.136.198",
"serverIP": "164.73.2.68",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 30 18:34:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=164.73.2.68 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=127.245.136.198 spt=36361 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:34:48 rt=1693438488386 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48ccaf25-e0fda0de cn2=36361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=127.245.136.198 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 30 18:34:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=164.73.2.68 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=127.245.136.198 spt=36361 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:34:48 rt=1693438488386 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48ccaf25-e0fda0de cn2=36361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=127.245.136.198 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 36361
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1693438488386
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:193.221.197.255', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 127.245.136.198
serverIP: 164.73.2.68
userName: - | Explain this syslog message |
<185>Aug 30 18:47:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=181.120.59.253 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=117.2.61.33 spt=40835 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:47:10 rt=1693439230100 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48d80072-8667352f cn2=40835 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=117.2.61.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 40835,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1693439230100 ",
"message": "<185>Aug 30 18:47:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=181.120.59.253 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=117.2.61.33 spt=40835 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 30 2023 18:47:10 rt=1693439230100 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36\" dvchost=WAFirewall externalId=18a48d80072-8667352f cn2=40835 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=117.2.61.33 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:94.40.45.2",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "117.2.61.33",
"serverIP": "181.120.59.253",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 30 18:47:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=181.120.59.253 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=117.2.61.33 spt=40835 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:47:10 rt=1693439230100 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48d80072-8667352f cn2=40835 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=117.2.61.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 30 18:47:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=181.120.59.253 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=117.2.61.33 spt=40835 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:47:10 rt=1693439230100 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48d80072-8667352f cn2=40835 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=117.2.61.33 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 40835
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1693439230100
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:94.40.45.2', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 117.2.61.33
serverIP: 181.120.59.253
userName: - | Explain this syslog message |
<185>Aug 30 18:47:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.176.242.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.167.185.205 spt=40835 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:47:10 rt=1693439230100 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48d80072-8667352f cn2=40835 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.167.185.205 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 40835,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1693439230100 ",
"message": "<185>Aug 30 18:47:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.176.242.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=216.167.185.205 spt=40835 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 30 2023 18:47:10 rt=1693439230100 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36\" dvchost=WAFirewall externalId=18a48d80072-8667352f cn2=40835 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.167.185.205 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:94.40.45.2",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "216.167.185.205",
"serverIP": "254.176.242.234",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 30 18:47:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.176.242.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.167.185.205 spt=40835 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:47:10 rt=1693439230100 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48d80072-8667352f cn2=40835 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.167.185.205 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 30 18:47:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.176.242.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.167.185.205 spt=40835 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:47:10 rt=1693439230100 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48d80072-8667352f cn2=40835 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.167.185.205 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 40835
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1693439230100
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:94.40.45.2', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 216.167.185.205
serverIP: 254.176.242.234
userName: - | Explain this syslog message |
<185>Aug 30 18:47:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=85.106.18.43 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=163.162.200.60 spt=40835 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:47:10 rt=1693439230100 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48d80072-8667352f cn2=40835 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.162.200.60 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 40835,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1693439230100 ",
"message": "<185>Aug 30 18:47:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=85.106.18.43 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=163.162.200.60 spt=40835 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 30 2023 18:47:10 rt=1693439230100 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36\" dvchost=WAFirewall externalId=18a48d80072-8667352f cn2=40835 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.162.200.60 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:94.40.45.2",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "163.162.200.60",
"serverIP": "85.106.18.43",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 30 18:47:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=85.106.18.43 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=163.162.200.60 spt=40835 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:47:10 rt=1693439230100 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48d80072-8667352f cn2=40835 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.162.200.60 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 30 18:47:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=85.106.18.43 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=163.162.200.60 spt=40835 requestMethod=GET app=HTTP requestContext="-" start=Aug 30 2023 18:47:10 rt=1693439230100 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" dvchost=WAFirewall externalId=18a48d80072-8667352f cn2=40835 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.162.200.60 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 40835
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1693439230100
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:94.40.45.2', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 163.162.200.60
serverIP: 85.106.18.43
userName: - | Explain this syslog message |
<185>Nov 9 13:29:03 WAFirewall CEF:0|Barracuda|WAF|1210|321|PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM|1|cat=WF dst=68.182.64.45 dpt=443 act=DENY msg=[type\="python-php-attacks-medium" pattern\="python-cfm-command-substrings" token\=" exec " Parameter\="l2026" value\="..for serving our community. Also\\"] duser="-" src=250.50.128.58 spt=55241 requestMethod=POST app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/comm/SurveyNE.jsp?SurveyKeyHex=28366849242C3D54622C7E3E start=Nov 09 2023 13:29:03 rt=1699558143578 request=/servlet/eAndar.Survey requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bb58f3658-40782949 cn2=55241 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=250.50.128.58 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55241,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/servlet/eAndar.Survey",
"localhostname": "WAFirewall",
"localstarttime": "1699558143578 ",
"message": "<185>Nov 9 13:29:03 WAFirewall CEF:0|Barracuda|WAF|1210|321|PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM|1|cat=WF dst=68.182.64.45 dpt=443 act=DENY msg=[type\\=\"python-php-attacks-medium\" pattern\\=\"python-cfm-command-substrings\" token\\=\" exec \" Parameter\\=\"l2026\" value\\=\"..for serving our community. Also\\\\\"] duser=\"-\" src=250.50.128.58 spt=55241 requestMethod=POST app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/comm/SurveyNE.jsp?SurveyKeyHex=28366849242C3D54622C7E3E start=Nov 09 2023 13:29:03 rt=1699558143578 request=/servlet/eAndar.Survey requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18bb58f3658-40782949 cn2=55241 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=250.50.128.58 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:69.226.184.74",
"PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM",
"barracuda_waf_PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM",
"RuleType:GLOBAL",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "321",
"streamName": "barracuda_waf",
"clientIP": "250.50.128.58",
"serverIP": "68.182.64.45",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 9 13:29:03 WAFirewall CEF:0|Barracuda|WAF|1210|321|PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM|1|cat=WF dst=68.182.64.45 dpt=443 act=DENY msg=[type\="python-php-attacks-medium" pattern\="python-cfm-command-substrings" token\=" exec " Parameter\="l2026" value\="..for serving our community. Also\\"] duser="-" src=250.50.128.58 spt=55241 requestMethod=POST app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/comm/SurveyNE.jsp?SurveyKeyHex=28366849242C3D54622C7E3E start=Nov 09 2023 13:29:03 rt=1699558143578 request=/servlet/eAndar.Survey requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bb58f3658-40782949 cn2=55241 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=250.50.128.58 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 9 13:29:03 WAFirewall CEF:0|Barracuda|WAF|1210|321|PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM|1|cat=WF dst=68.182.64.45 dpt=443 act=DENY msg=[type\="python-php-attacks-medium" pattern\="python-cfm-command-substrings" token\=" exec " Parameter\="l2026" value\="..for serving our community. Also\\"] duser="-" src=250.50.128.58 spt=55241 requestMethod=POST app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/comm/SurveyNE.jsp?SurveyKeyHex=28366849242C3D54622C7E3E start=Nov 09 2023 13:29:03 rt=1699558143578 request=/servlet/eAndar.Survey requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bb58f3658-40782949 cn2=55241 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=250.50.128.58 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55241
facilitycode: 23
facilitylabel: local7
fqdn: /servlet/eAndar.Survey
localhostname: WAFirewall
localstarttime: 1699558143578
messagetype: PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:69.226.184.74', 'PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM', 'barracuda_waf_PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM', 'RuleType:GLOBAL', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 321
streamName: barracuda_waf
clientIP: 250.50.128.58
serverIP: 68.182.64.45
userName: - | Explain this syslog message |
<185>Nov 9 13:29:03 WAFirewall CEF:0|Barracuda|WAF|1210|321|PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM|1|cat=WF dst=249.180.116.8 dpt=443 act=DENY msg=[type\="python-php-attacks-medium" pattern\="python-cfm-command-substrings" token\=" exec " Parameter\="l2026" value\="..for serving our community. Also\\"] duser="-" src=69.224.248.127 spt=55241 requestMethod=POST app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/comm/SurveyNE.jsp?SurveyKeyHex=28366849242C3D54622C7E3E start=Nov 09 2023 13:29:03 rt=1699558143578 request=/servlet/eAndar.Survey requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bb58f3658-40782949 cn2=55241 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=69.224.248.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55241,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/servlet/eAndar.Survey",
"localhostname": "WAFirewall",
"localstarttime": "1699558143578 ",
"message": "<185>Nov 9 13:29:03 WAFirewall CEF:0|Barracuda|WAF|1210|321|PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM|1|cat=WF dst=249.180.116.8 dpt=443 act=DENY msg=[type\\=\"python-php-attacks-medium\" pattern\\=\"python-cfm-command-substrings\" token\\=\" exec \" Parameter\\=\"l2026\" value\\=\"..for serving our community. Also\\\\\"] duser=\"-\" src=69.224.248.127 spt=55241 requestMethod=POST app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/comm/SurveyNE.jsp?SurveyKeyHex=28366849242C3D54622C7E3E start=Nov 09 2023 13:29:03 rt=1699558143578 request=/servlet/eAndar.Survey requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18bb58f3658-40782949 cn2=55241 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=69.224.248.127 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:69.226.184.74",
"PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM",
"barracuda_waf_PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM",
"RuleType:GLOBAL",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "321",
"streamName": "barracuda_waf",
"clientIP": "69.224.248.127",
"serverIP": "249.180.116.8",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 9 13:29:03 WAFirewall CEF:0|Barracuda|WAF|1210|321|PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM|1|cat=WF dst=249.180.116.8 dpt=443 act=DENY msg=[type\="python-php-attacks-medium" pattern\="python-cfm-command-substrings" token\=" exec " Parameter\="l2026" value\="..for serving our community. Also\\"] duser="-" src=69.224.248.127 spt=55241 requestMethod=POST app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/comm/SurveyNE.jsp?SurveyKeyHex=28366849242C3D54622C7E3E start=Nov 09 2023 13:29:03 rt=1699558143578 request=/servlet/eAndar.Survey requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bb58f3658-40782949 cn2=55241 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=69.224.248.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 9 13:29:03 WAFirewall CEF:0|Barracuda|WAF|1210|321|PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM|1|cat=WF dst=249.180.116.8 dpt=443 act=DENY msg=[type\="python-php-attacks-medium" pattern\="python-cfm-command-substrings" token\=" exec " Parameter\="l2026" value\="..for serving our community. Also\\"] duser="-" src=69.224.248.127 spt=55241 requestMethod=POST app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/comm/SurveyNE.jsp?SurveyKeyHex=28366849242C3D54622C7E3E start=Nov 09 2023 13:29:03 rt=1699558143578 request=/servlet/eAndar.Survey requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bb58f3658-40782949 cn2=55241 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=69.224.248.127 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55241
facilitycode: 23
facilitylabel: local7
fqdn: /servlet/eAndar.Survey
localhostname: WAFirewall
localstarttime: 1699558143578
messagetype: PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:69.226.184.74', 'PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM', 'barracuda_waf_PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM', 'RuleType:GLOBAL', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 321
streamName: barracuda_waf
clientIP: 69.224.248.127
serverIP: 249.180.116.8
userName: - | Explain this syslog message |
<185>Nov 9 13:29:03 WAFirewall CEF:0|Barracuda|WAF|1210|321|PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM|1|cat=WF dst=191.223.20.34 dpt=443 act=DENY msg=[type\="python-php-attacks-medium" pattern\="python-cfm-command-substrings" token\=" exec " Parameter\="l2026" value\="..for serving our community. Also\\"] duser="-" src=118.38.233.112 spt=55241 requestMethod=POST app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/comm/SurveyNE.jsp?SurveyKeyHex=28366849242C3D54622C7E3E start=Nov 09 2023 13:29:03 rt=1699558143578 request=/servlet/eAndar.Survey requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bb58f3658-40782949 cn2=55241 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=118.38.233.112 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55241,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/servlet/eAndar.Survey",
"localhostname": "WAFirewall",
"localstarttime": "1699558143578 ",
"message": "<185>Nov 9 13:29:03 WAFirewall CEF:0|Barracuda|WAF|1210|321|PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM|1|cat=WF dst=191.223.20.34 dpt=443 act=DENY msg=[type\\=\"python-php-attacks-medium\" pattern\\=\"python-cfm-command-substrings\" token\\=\" exec \" Parameter\\=\"l2026\" value\\=\"..for serving our community. Also\\\\\"] duser=\"-\" src=118.38.233.112 spt=55241 requestMethod=POST app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/comm/SurveyNE.jsp?SurveyKeyHex=28366849242C3D54622C7E3E start=Nov 09 2023 13:29:03 rt=1699558143578 request=/servlet/eAndar.Survey requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18bb58f3658-40782949 cn2=55241 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=118.38.233.112 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:69.226.184.74",
"PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM",
"barracuda_waf_PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM",
"RuleType:GLOBAL",
"barracuda_waf",
"cef",
"FollowUpAction:NONE",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "321",
"streamName": "barracuda_waf",
"clientIP": "118.38.233.112",
"serverIP": "191.223.20.34",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 9 13:29:03 WAFirewall CEF:0|Barracuda|WAF|1210|321|PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM|1|cat=WF dst=191.223.20.34 dpt=443 act=DENY msg=[type\="python-php-attacks-medium" pattern\="python-cfm-command-substrings" token\=" exec " Parameter\="l2026" value\="..for serving our community. Also\\"] duser="-" src=118.38.233.112 spt=55241 requestMethod=POST app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/comm/SurveyNE.jsp?SurveyKeyHex=28366849242C3D54622C7E3E start=Nov 09 2023 13:29:03 rt=1699558143578 request=/servlet/eAndar.Survey requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bb58f3658-40782949 cn2=55241 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=118.38.233.112 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 9 13:29:03 WAFirewall CEF:0|Barracuda|WAF|1210|321|PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM|1|cat=WF dst=191.223.20.34 dpt=443 act=DENY msg=[type\="python-php-attacks-medium" pattern\="python-cfm-command-substrings" token\=" exec " Parameter\="l2026" value\="..for serving our community. Also\\"] duser="-" src=118.38.233.112 spt=55241 requestMethod=POST app=TLSv1.3 requestContext=https://uweb1.unitedwayeservice.org/comm/SurveyNE.jsp?SurveyKeyHex=28366849242C3D54622C7E3E start=Nov 09 2023 13:29:03 rt=1699558143578 request=/servlet/eAndar.Survey requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bb58f3658-40782949 cn2=55241 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=118.38.233.112 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55241
facilitycode: 23
facilitylabel: local7
fqdn: /servlet/eAndar.Survey
localhostname: WAFirewall
localstarttime: 1699558143578
messagetype: PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:69.226.184.74', 'PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM', 'barracuda_waf_PYTHON_PHP_ATTACKS_MEDIUM_IN_PARAM', 'RuleType:GLOBAL', 'barracuda_waf', 'cef', 'FollowUpAction:NONE', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 321
streamName: barracuda_waf
clientIP: 118.38.233.112
serverIP: 191.223.20.34
userName: - | Explain this syslog message |
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=166.139.206.51 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.195.247.93 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.195.247.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=166.139.206.51 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=159.195.247.93 spt=39378 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.195.247.93 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1678003327725 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 39378,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "159.195.247.93",
"serverIP": "166.139.206.51",
"userName": "-"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.