input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=166.139.206.51 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.195.247.93 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.195.247.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=166.139.206.51 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.195.247.93 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.195.247.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1678003327725 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 39378 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 159.195.247.93 serverIP: 166.139.206.51 userName: -
Explain this syslog message
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.201.183.221 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=7.159.227.156 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.159.227.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "FollowUpAction:NONE", "ProxyIP:152.89.196.211", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.201.183.221 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=7.159.227.156 spt=39378 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.159.227.156 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1678003327725 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 39378, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "7.159.227.156", "serverIP": "3.201.183.221", "userName": "-" }
Create a JSON artifact from the message
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.201.183.221 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=7.159.227.156 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.159.227.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.201.183.221 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=7.159.227.156 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.159.227.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1678003327725 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 39378 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 7.159.227.156 serverIP: 3.201.183.221 userName: -
Explain this syslog message
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=73.70.228.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.248.188.223 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.248.188.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "FollowUpAction:NONE", "ProxyIP:152.89.196.211", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=73.70.228.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=166.248.188.223 spt=39378 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.248.188.223 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1678003327725 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 39378, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "166.248.188.223", "serverIP": "73.70.228.16", "userName": "-" }
Create a JSON artifact from the message
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=73.70.228.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.248.188.223 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.248.188.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=73.70.228.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.248.188.223 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.248.188.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1678003327725 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 39378 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 166.248.188.223 serverIP: 73.70.228.16 userName: -
Explain this syslog message
<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.240.46.121 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=116.225.21.52 spt=55012 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.225.21.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "FollowUpAction:NONE", "ProxyIP:152.89.196.211", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.240.46.121 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=116.225.21.52 spt=55012 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.225.21.52 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1678003638202 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 55012, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "116.225.21.52", "serverIP": "42.240.46.121", "userName": "-" }
Create a JSON artifact from the message
<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.240.46.121 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=116.225.21.52 spt=55012 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.225.21.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.240.46.121 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=116.225.21.52 spt=55012 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.225.21.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1678003638202 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 55012 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 116.225.21.52 serverIP: 42.240.46.121 userName: -
Explain this syslog message
<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=96.98.129.228 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.197.32.251 spt=55012 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.197.32.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "FollowUpAction:NONE", "ProxyIP:152.89.196.211", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=96.98.129.228 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=21.197.32.251 spt=55012 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.197.32.251 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1678003638202 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 55012, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "21.197.32.251", "serverIP": "96.98.129.228", "userName": "-" }
Create a JSON artifact from the message
<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=96.98.129.228 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.197.32.251 spt=55012 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.197.32.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=96.98.129.228 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.197.32.251 spt=55012 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.197.32.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1678003638202 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 55012 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 21.197.32.251 serverIP: 96.98.129.228 userName: -
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"219.200.192.254","externalIp":"108.6.53.199","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=219.200.192.254 ::: serverIP=108.6.53.199 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"219.200.192.254\",\"externalIp\":\"108.6.53.199\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=219.200.192.254 ::: serverIP=108.6.53.199 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "219.200.192.254", "serverIP": "108.6.53.199", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"219.200.192.254","externalIp":"108.6.53.199","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=219.200.192.254 ::: serverIP=108.6.53.199 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"219.200.192.254","externalIp":"108.6.53.199","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=219.200.192.254 ::: serverIP=108.6.53.199 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 219.200.192.254 serverIP: 108.6.53.199 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"240.215.81.64","externalIp":"188.204.38.195","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=240.215.81.64 ::: serverIP=188.204.38.195 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"240.215.81.64\",\"externalIp\":\"188.204.38.195\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=240.215.81.64 ::: serverIP=188.204.38.195 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "240.215.81.64", "serverIP": "188.204.38.195", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"240.215.81.64","externalIp":"188.204.38.195","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=240.215.81.64 ::: serverIP=188.204.38.195 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"240.215.81.64","externalIp":"188.204.38.195","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=240.215.81.64 ::: serverIP=188.204.38.195 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 240.215.81.64 serverIP: 188.204.38.195 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.116.131.58","externalIp":"114.2.51.102","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.116.131.58 ::: serverIP=114.2.51.102 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"88.116.131.58\",\"externalIp\":\"114.2.51.102\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=88.116.131.58 ::: serverIP=114.2.51.102 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "88.116.131.58", "serverIP": "114.2.51.102", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.116.131.58","externalIp":"114.2.51.102","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.116.131.58 ::: serverIP=114.2.51.102 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.116.131.58","externalIp":"114.2.51.102","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.116.131.58 ::: serverIP=114.2.51.102 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 88.116.131.58 serverIP: 114.2.51.102 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.129.227.122","externalIp":"106.193.39.241","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.129.227.122 ::: serverIP=106.193.39.241 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"88.129.227.122\",\"externalIp\":\"106.193.39.241\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=88.129.227.122 ::: serverIP=106.193.39.241 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "88.129.227.122", "serverIP": "106.193.39.241", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.129.227.122","externalIp":"106.193.39.241","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.129.227.122 ::: serverIP=106.193.39.241 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.129.227.122","externalIp":"106.193.39.241","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.129.227.122 ::: serverIP=106.193.39.241 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 88.129.227.122 serverIP: 106.193.39.241 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"89.67.21.124","externalIp":"144.71.143.234","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=89.67.21.124 ::: serverIP=144.71.143.234 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"89.67.21.124\",\"externalIp\":\"144.71.143.234\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=89.67.21.124 ::: serverIP=144.71.143.234 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "89.67.21.124", "serverIP": "144.71.143.234", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"89.67.21.124","externalIp":"144.71.143.234","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=89.67.21.124 ::: serverIP=144.71.143.234 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"89.67.21.124","externalIp":"144.71.143.234","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=89.67.21.124 ::: serverIP=144.71.143.234 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 89.67.21.124 serverIP: 144.71.143.234 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"44.178.186.24","externalIp":"15.250.140.74","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=44.178.186.24 ::: serverIP=15.250.140.74 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"44.178.186.24\",\"externalIp\":\"15.250.140.74\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=44.178.186.24 ::: serverIP=15.250.140.74 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "44.178.186.24", "serverIP": "15.250.140.74", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"44.178.186.24","externalIp":"15.250.140.74","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=44.178.186.24 ::: serverIP=15.250.140.74 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"44.178.186.24","externalIp":"15.250.140.74","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=44.178.186.24 ::: serverIP=15.250.140.74 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 44.178.186.24 serverIP: 15.250.140.74 userName: alice
Explain this syslog message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.192.129.40 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=192.3.74.35 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.3.74.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:130.211.54.158", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.192.129.40 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=192.3.74.35 spt=37018 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication=\"python-requests/2.28.2\" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.3.74.35 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675766868012 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 37018, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "192.3.74.35", "serverIP": "5.192.129.40", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.192.129.40 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=192.3.74.35 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.3.74.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.192.129.40 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=192.3.74.35 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.3.74.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:130.211.54.158', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675766868012 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 37018 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 192.3.74.35 serverIP: 5.192.129.40 userName: -
Explain this syslog message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.221.87.69 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=77.80.143.0 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.80.143.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:130.211.54.158", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.221.87.69 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=77.80.143.0 spt=37018 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication=\"python-requests/2.28.2\" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.80.143.0 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675766868012 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 37018, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "77.80.143.0", "serverIP": "146.221.87.69", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.221.87.69 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=77.80.143.0 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.80.143.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.221.87.69 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=77.80.143.0 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.80.143.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:130.211.54.158', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675766868012 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 37018 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 77.80.143.0 serverIP: 146.221.87.69 userName: -
Explain this syslog message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.62.66.181 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=196.114.140.149 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.114.140.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:130.211.54.158", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.62.66.181 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=196.114.140.149 spt=37018 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication=\"python-requests/2.28.2\" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.114.140.149 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675766868012 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 37018, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "196.114.140.149", "serverIP": "87.62.66.181", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.62.66.181 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=196.114.140.149 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.114.140.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.62.66.181 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=196.114.140.149 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.114.140.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:130.211.54.158', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675766868012 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 37018 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 196.114.140.149 serverIP: 87.62.66.181 userName: -
Explain this syslog message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.44.217.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=202.83.131.102 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=202.83.131.102 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:130.211.54.158", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.44.217.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=202.83.131.102 spt=37018 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication=\"python-requests/2.28.2\" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=202.83.131.102 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675766868012 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 37018, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "202.83.131.102", "serverIP": "91.44.217.212", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.44.217.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=202.83.131.102 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=202.83.131.102 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.44.217.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=202.83.131.102 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=202.83.131.102 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:130.211.54.158', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675766868012 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 37018 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 202.83.131.102 serverIP: 91.44.217.212 userName: -
Explain this syslog message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=157.127.209.214 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=26.158.99.97 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.158.99.97 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "ProxyIP:130.211.54.158", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=157.127.209.214 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=26.158.99.97 spt=37018 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication=\"python-requests/2.28.2\" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.158.99.97 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675766868012 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/", "clientport": 37018, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "26.158.99.97", "serverIP": "157.127.209.214", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=157.127.209.214 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=26.158.99.97 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.158.99.97 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=157.127.209.214 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=26.158.99.97 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.158.99.97 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:130.211.54.158', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675766868012 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: / clientport: 37018 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 26.158.99.97 serverIP: 157.127.209.214 userName: -
Explain this syslog message
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=154.189.184.55 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=176.20.224.174 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=176.20.224.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleType:GLOBAL", "barracuda_waf", "REMOTE_FILE_INCLUSION", "cef", "ProxyIP:66.249.79.240", "FollowUpAction:NONE", "barracuda_waf_REMOTE_FILE_INCLUSION", "AttackGroup:Injection Attacks", "rfc3164", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=154.189.184.55 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"https\\\\:/\" Parameter\\=\"F\" value\\=\"https\\\\://zohsex.xyz/nude/515-websites-to-find-escorts.php \"] duser=\"-\" src=176.20.224.174 spt=38341 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=176.20.224.174 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1662043123877 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "REMOTE_FILE_INCLUSION", "severitycode": 9, "fqdn": "/comm/AndarTrack.jsp", "clientport": 38341, "vendorcode": "164", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "176.20.224.174", "serverIP": "154.189.184.55", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=154.189.184.55 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=176.20.224.174 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=176.20.224.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=154.189.184.55 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=176.20.224.174 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=176.20.224.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleType:GLOBAL', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'ProxyIP:66.249.79.240', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1662043123877 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: REMOTE_FILE_INCLUSION severitycode: 9 fqdn: /comm/AndarTrack.jsp clientport: 38341 vendorcode: 164 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 176.20.224.174 serverIP: 154.189.184.55 userName: -
Explain this syslog message
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=173.163.252.19 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=205.62.11.78 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=205.62.11.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleType:GLOBAL", "barracuda_waf", "REMOTE_FILE_INCLUSION", "cef", "ProxyIP:66.249.79.240", "FollowUpAction:NONE", "barracuda_waf_REMOTE_FILE_INCLUSION", "AttackGroup:Injection Attacks", "rfc3164", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=173.163.252.19 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"https\\\\:/\" Parameter\\=\"F\" value\\=\"https\\\\://zohsex.xyz/nude/515-websites-to-find-escorts.php \"] duser=\"-\" src=205.62.11.78 spt=38341 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=205.62.11.78 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1662043123877 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "REMOTE_FILE_INCLUSION", "severitycode": 9, "fqdn": "/comm/AndarTrack.jsp", "clientport": 38341, "vendorcode": "164", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "205.62.11.78", "serverIP": "173.163.252.19", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=173.163.252.19 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=205.62.11.78 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=205.62.11.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=173.163.252.19 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=205.62.11.78 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=205.62.11.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleType:GLOBAL', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'ProxyIP:66.249.79.240', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1662043123877 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: REMOTE_FILE_INCLUSION severitycode: 9 fqdn: /comm/AndarTrack.jsp clientport: 38341 vendorcode: 164 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 205.62.11.78 serverIP: 173.163.252.19 userName: -
Explain this syslog message
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=191.223.212.174 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=131.170.59.96 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=131.170.59.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleType:GLOBAL", "barracuda_waf", "REMOTE_FILE_INCLUSION", "cef", "ProxyIP:66.249.79.240", "FollowUpAction:NONE", "barracuda_waf_REMOTE_FILE_INCLUSION", "AttackGroup:Injection Attacks", "rfc3164", "RuleID:security-policy", "SessionID:-" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=191.223.212.174 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"https\\\\:/\" Parameter\\=\"F\" value\\=\"https\\\\://zohsex.xyz/nude/515-websites-to-find-escorts.php \"] duser=\"-\" src=131.170.59.96 spt=38341 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=131.170.59.96 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1662043123877 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "REMOTE_FILE_INCLUSION", "severitycode": 9, "fqdn": "/comm/AndarTrack.jsp", "clientport": 38341, "vendorcode": "164", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "131.170.59.96", "serverIP": "191.223.212.174", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=191.223.212.174 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=131.170.59.96 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=131.170.59.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=191.223.212.174 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=131.170.59.96 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=131.170.59.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleType:GLOBAL', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'ProxyIP:66.249.79.240', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-'] productids: [0] sourceinfo: unknown localstarttime: 1662043123877 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: REMOTE_FILE_INCLUSION severitycode: 9 fqdn: /comm/AndarTrack.jsp clientport: 38341 vendorcode: 164 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 131.170.59.96 serverIP: 191.223.212.174 userName: -
Explain this syslog message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=4.39.105.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=119.52.39.122 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=119.52.39.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45932, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1704432226032 ", "message": "<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=4.39.105.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=119.52.39.122 spt=45932 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=119.52.39.122 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:94.102.61.7" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "119.52.39.122", "serverIP": "4.39.105.241", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=4.39.105.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=119.52.39.122 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=119.52.39.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=4.39.105.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=119.52.39.122 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=119.52.39.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45932 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1704432226032 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7'] vendorcode: 342 streamName: barracuda_waf clientIP: 119.52.39.122 serverIP: 4.39.105.241 userName: -
Explain this syslog message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=155.35.176.91 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=61.22.153.26 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=61.22.153.26 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45932, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1704432226032 ", "message": "<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=155.35.176.91 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=61.22.153.26 spt=45932 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=61.22.153.26 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:94.102.61.7" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "61.22.153.26", "serverIP": "155.35.176.91", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=155.35.176.91 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=61.22.153.26 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=61.22.153.26 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=155.35.176.91 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=61.22.153.26 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=61.22.153.26 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45932 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1704432226032 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7'] vendorcode: 342 streamName: barracuda_waf clientIP: 61.22.153.26 serverIP: 155.35.176.91 userName: -
Explain this syslog message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.232.167.55 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=44.86.11.94 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.86.11.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45932, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1704432226032 ", "message": "<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.232.167.55 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=44.86.11.94 spt=45932 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.86.11.94 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:94.102.61.7" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "44.86.11.94", "serverIP": "46.232.167.55", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.232.167.55 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=44.86.11.94 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.86.11.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.232.167.55 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=44.86.11.94 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.86.11.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45932 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1704432226032 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7'] vendorcode: 342 streamName: barracuda_waf clientIP: 44.86.11.94 serverIP: 46.232.167.55 userName: -
Explain this syslog message
<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=221.88.231.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=34.103.129.37 spt=59102 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.103.129.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59102, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1704432294501 ", "message": "<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=221.88.231.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=34.103.129.37 spt=59102 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.103.129.37 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:94.102.61.7" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "34.103.129.37", "serverIP": "221.88.231.16", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=221.88.231.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=34.103.129.37 spt=59102 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.103.129.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=221.88.231.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=34.103.129.37 spt=59102 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.103.129.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59102 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1704432294501 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7'] vendorcode: 342 streamName: barracuda_waf clientIP: 34.103.129.37 serverIP: 221.88.231.16 userName: -
Explain this syslog message
<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=85.17.63.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=101.141.27.107 spt=59102 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=101.141.27.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 59102, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1704432294501 ", "message": "<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=85.17.63.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=101.141.27.107 spt=59102 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=101.141.27.107 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:94.102.61.7" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "101.141.27.107", "serverIP": "85.17.63.73", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=85.17.63.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=101.141.27.107 spt=59102 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=101.141.27.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=85.17.63.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=101.141.27.107 spt=59102 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=101.141.27.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 59102 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1704432294501 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7'] vendorcode: 342 streamName: barracuda_waf clientIP: 101.141.27.107 serverIP: 85.17.63.73 userName: -
Explain this syslog message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=255.187.94.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.74.184.219 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.74.184.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45932, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1704432226032 ", "message": "<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=255.187.94.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=0.74.184.219 spt=45932 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.74.184.219 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:94.102.61.7" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "0.74.184.219", "serverIP": "255.187.94.33", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=255.187.94.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.74.184.219 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.74.184.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=255.187.94.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.74.184.219 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.74.184.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45932 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1704432226032 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7'] vendorcode: 342 streamName: barracuda_waf clientIP: 0.74.184.219 serverIP: 255.187.94.33 userName: -
Explain this syslog message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=9.121.17.49 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=197.87.67.251 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.87.67.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45932, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1704432226032 ", "message": "<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=9.121.17.49 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=197.87.67.251 spt=45932 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.87.67.251 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:94.102.61.7" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "197.87.67.251", "serverIP": "9.121.17.49", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=9.121.17.49 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=197.87.67.251 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.87.67.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=9.121.17.49 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=197.87.67.251 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.87.67.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45932 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1704432226032 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7'] vendorcode: 342 streamName: barracuda_waf clientIP: 197.87.67.251 serverIP: 9.121.17.49 userName: -
Explain this syslog message
<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=50.89.109.207 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=185.89.108.151 spt=36044 requestMethod=GET app=HTTP requestContext="-" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication="Unknown" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.89.108.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:138.197.159.145", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=50.89.109.207 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=185.89.108.151 spt=36044 requestMethod=GET app=HTTP requestContext=\"-\" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.89.108.151 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1671752051056 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/wp-admin/style.php", "clientport": 36044, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "185.89.108.151", "serverIP": "50.89.109.207", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=50.89.109.207 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=185.89.108.151 spt=36044 requestMethod=GET app=HTTP requestContext="-" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication="Unknown" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.89.108.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=50.89.109.207 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=185.89.108.151 spt=36044 requestMethod=GET app=HTTP requestContext="-" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication="Unknown" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.89.108.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:138.197.159.145', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1671752051056 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /wp-admin/style.php clientport: 36044 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 185.89.108.151 serverIP: 50.89.109.207 userName: -
Explain this syslog message
<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.175.87.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=201.130.51.224 spt=36044 requestMethod=GET app=HTTP requestContext="-" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication="Unknown" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.130.51.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 80, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:138.197.159.145", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.175.87.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=201.130.51.224 spt=36044 requestMethod=GET app=HTTP requestContext=\"-\" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.130.51.224 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1671752051056 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/wp-admin/style.php", "clientport": 36044, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "201.130.51.224", "serverIP": "134.175.87.146", "userName": "-" }
Create a JSON artifact from the message
<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.175.87.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=201.130.51.224 spt=36044 requestMethod=GET app=HTTP requestContext="-" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication="Unknown" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.130.51.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.175.87.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=201.130.51.224 spt=36044 requestMethod=GET app=HTTP requestContext="-" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication="Unknown" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.130.51.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 80 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:138.197.159.145', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1671752051056 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /wp-admin/style.php clientport: 36044 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 201.130.51.224 serverIP: 134.175.87.146 userName: -
Explain this syslog message
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=214.187.109.72 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=52.27.164.139 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.27.164.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:114.119.138.199", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=214.187.109.72 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=52.27.164.139 spt=62361 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.27.164.139 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1665907009267 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/robots.txt", "clientport": 62361, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "52.27.164.139", "serverIP": "214.187.109.72", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=214.187.109.72 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=52.27.164.139 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.27.164.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=214.187.109.72 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=52.27.164.139 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.27.164.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:114.119.138.199', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1665907009267 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /robots.txt clientport: 62361 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 52.27.164.139 serverIP: 214.187.109.72 userName: -
Explain this syslog message
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=234.92.7.67 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=17.176.217.141 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.176.217.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:114.119.138.199", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=234.92.7.67 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=17.176.217.141 spt=62361 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.176.217.141 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1665907009267 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/robots.txt", "clientport": 62361, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "17.176.217.141", "serverIP": "234.92.7.67", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=234.92.7.67 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=17.176.217.141 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.176.217.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=234.92.7.67 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=17.176.217.141 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.176.217.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:114.119.138.199', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1665907009267 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /robots.txt clientport: 62361 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 17.176.217.141 serverIP: 234.92.7.67 userName: -
Explain this syslog message
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=124.123.254.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=30.114.28.91 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.114.28.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:114.119.138.199", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=124.123.254.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=30.114.28.91 spt=62361 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.114.28.91 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1665907009267 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/robots.txt", "clientport": 62361, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "30.114.28.91", "serverIP": "124.123.254.93", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=124.123.254.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=30.114.28.91 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.114.28.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=124.123.254.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=30.114.28.91 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.114.28.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:114.119.138.199', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1665907009267 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /robots.txt clientport: 62361 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 30.114.28.91 serverIP: 124.123.254.93 userName: -
Explain this syslog message
<132>Dec 23 17:07:59 ip-10-1-16-76 drupal: https://shareholders.stark.com|1703351279|access denied|197.188.69.194|https://shareholders.stark.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Dec 23 17:07:59", "message": "<132>Dec 23 17:07:59 ip-10-1-16-76 drupal: https://shareholders.stark.com|1703351279|access denied|197.188.69.194|https://shareholders.stark.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1703351279", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "197.188.69.194" }
Create a JSON artifact from the message
<132>Dec 23 17:07:59 ip-10-1-16-76 drupal: https://shareholders.stark.com|1703351279|access denied|197.188.69.194|https://shareholders.stark.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Dec 23 17:07:59 ip-10-1-16-76 drupal: https://shareholders.stark.com|1703351279|access denied|197.188.69.194|https://shareholders.stark.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Dec 23 17:07:59 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1703351279 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 197.188.69.194
Explain this syslog message
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=61.168.138.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.83.150.252 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.83.150.252 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:185.174.159.20", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=61.168.138.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=131.83.150.252 spt=61071 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication=\"Python-urllib/3.10\" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.83.150.252 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1657550294442 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/remote/fgt_lang", "clientport": 61071, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "131.83.150.252", "serverIP": "61.168.138.80", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=61.168.138.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.83.150.252 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.83.150.252 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=61.168.138.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.83.150.252 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.83.150.252 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:185.174.159.20', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1657550294442 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /remote/fgt_lang clientport: 61071 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 131.83.150.252 serverIP: 61.168.138.80 userName: -
Explain this syslog message
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=173.18.74.107 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=11.190.140.2 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.190.140.2 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:185.174.159.20", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=173.18.74.107 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=11.190.140.2 spt=61071 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication=\"Python-urllib/3.10\" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.190.140.2 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1657550294442 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/remote/fgt_lang", "clientport": 61071, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "11.190.140.2", "serverIP": "173.18.74.107", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=173.18.74.107 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=11.190.140.2 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.190.140.2 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message