input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=166.139.206.51 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.195.247.93 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.195.247.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=166.139.206.51 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.195.247.93 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.195.247.93 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1678003327725
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 39378
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 159.195.247.93
serverIP: 166.139.206.51
userName: - | Explain this syslog message |
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.201.183.221 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=7.159.227.156 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.159.227.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.201.183.221 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=7.159.227.156 spt=39378 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.159.227.156 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1678003327725 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 39378,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "7.159.227.156",
"serverIP": "3.201.183.221",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.201.183.221 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=7.159.227.156 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.159.227.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=3.201.183.221 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=7.159.227.156 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=7.159.227.156 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1678003327725
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 39378
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 7.159.227.156
serverIP: 3.201.183.221
userName: - | Explain this syslog message |
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=73.70.228.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.248.188.223 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.248.188.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=73.70.228.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=166.248.188.223 spt=39378 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.248.188.223 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1678003327725 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 39378,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "166.248.188.223",
"serverIP": "73.70.228.16",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=73.70.228.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.248.188.223 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.248.188.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 5 02:02:07 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=73.70.228.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.248.188.223 spt=39378 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:02:07 rt=1678003327725 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cad2ed-78fa56bb cn2=39378 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.248.188.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1678003327725
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 39378
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 166.248.188.223
serverIP: 73.70.228.16
userName: - | Explain this syslog message |
<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.240.46.121 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=116.225.21.52 spt=55012 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.225.21.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.240.46.121 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=116.225.21.52 spt=55012 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.225.21.52 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1678003638202 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 55012,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "116.225.21.52",
"serverIP": "42.240.46.121",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.240.46.121 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=116.225.21.52 spt=55012 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.225.21.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=42.240.46.121 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=116.225.21.52 spt=55012 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=116.225.21.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1678003638202
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 55012
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 116.225.21.52
serverIP: 42.240.46.121
userName: - | Explain this syslog message |
<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=96.98.129.228 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.197.32.251 spt=55012 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.197.32.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"FollowUpAction:NONE",
"ProxyIP:152.89.196.211",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=96.98.129.228 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=21.197.32.251 spt=55012 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.197.32.251 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1678003638202 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 55012,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "21.197.32.251",
"serverIP": "96.98.129.228",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=96.98.129.228 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.197.32.251 spt=55012 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.197.32.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 5 02:07:18 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=96.98.129.228 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.197.32.251 spt=55012 requestMethod=GET app=TLSv1.3 requestContext="-" start=Mar 05 2023 02:07:18 rt=1678003638202 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=186b0cf8fba-7406262c cn2=55012 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.197.32.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'FollowUpAction:NONE', 'ProxyIP:152.89.196.211', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1678003638202
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 55012
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 21.197.32.251
serverIP: 96.98.129.228
userName: - | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"219.200.192.254","externalIp":"108.6.53.199","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=219.200.192.254 ::: serverIP=108.6.53.199 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "clicksapp.net",
"message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"219.200.192.254\",\"externalIp\":\"108.6.53.199\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=219.200.192.254 ::: serverIP=108.6.53.199 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "clicksapp.net",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-23T15:56:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsPotentially Harmful",
"streamName": "OpenDNS Detection",
"clientIP": "219.200.192.254",
"serverIP": "108.6.53.199",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"219.200.192.254","externalIp":"108.6.53.199","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=219.200.192.254 ::: serverIP=108.6.53.199 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"219.200.192.254","externalIp":"108.6.53.199","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=219.200.192.254 ::: serverIP=108.6.53.199 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: clicksapp.net
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: clicksapp.net
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-23T15:56:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsPotentially Harmful
streamName: OpenDNS Detection
clientIP: 219.200.192.254
serverIP: 108.6.53.199
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"240.215.81.64","externalIp":"188.204.38.195","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=240.215.81.64 ::: serverIP=188.204.38.195 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "clicksapp.net",
"message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"240.215.81.64\",\"externalIp\":\"188.204.38.195\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=240.215.81.64 ::: serverIP=188.204.38.195 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "clicksapp.net",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-23T15:56:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsPotentially Harmful",
"streamName": "OpenDNS Detection",
"clientIP": "240.215.81.64",
"serverIP": "188.204.38.195",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"240.215.81.64","externalIp":"188.204.38.195","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=240.215.81.64 ::: serverIP=188.204.38.195 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"240.215.81.64","externalIp":"188.204.38.195","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=240.215.81.64 ::: serverIP=188.204.38.195 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: clicksapp.net
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: clicksapp.net
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-23T15:56:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsPotentially Harmful
streamName: OpenDNS Detection
clientIP: 240.215.81.64
serverIP: 188.204.38.195
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.116.131.58","externalIp":"114.2.51.102","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.116.131.58 ::: serverIP=114.2.51.102 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "clicksapp.net",
"message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"88.116.131.58\",\"externalIp\":\"114.2.51.102\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=88.116.131.58 ::: serverIP=114.2.51.102 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "clicksapp.net",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-23T15:56:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsPotentially Harmful",
"streamName": "OpenDNS Detection",
"clientIP": "88.116.131.58",
"serverIP": "114.2.51.102",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.116.131.58","externalIp":"114.2.51.102","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.116.131.58 ::: serverIP=114.2.51.102 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.116.131.58","externalIp":"114.2.51.102","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.116.131.58 ::: serverIP=114.2.51.102 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: clicksapp.net
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: clicksapp.net
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-23T15:56:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsPotentially Harmful
streamName: OpenDNS Detection
clientIP: 88.116.131.58
serverIP: 114.2.51.102
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.129.227.122","externalIp":"106.193.39.241","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.129.227.122 ::: serverIP=106.193.39.241 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "clicksapp.net",
"message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"88.129.227.122\",\"externalIp\":\"106.193.39.241\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=88.129.227.122 ::: serverIP=106.193.39.241 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "clicksapp.net",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-23T15:56:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsPotentially Harmful",
"streamName": "OpenDNS Detection",
"clientIP": "88.129.227.122",
"serverIP": "106.193.39.241",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.129.227.122","externalIp":"106.193.39.241","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.129.227.122 ::: serverIP=106.193.39.241 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.129.227.122","externalIp":"106.193.39.241","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.129.227.122 ::: serverIP=106.193.39.241 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: clicksapp.net
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: clicksapp.net
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-23T15:56:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsPotentially Harmful
streamName: OpenDNS Detection
clientIP: 88.129.227.122
serverIP: 106.193.39.241
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"89.67.21.124","externalIp":"144.71.143.234","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=89.67.21.124 ::: serverIP=144.71.143.234 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "clicksapp.net",
"message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"89.67.21.124\",\"externalIp\":\"144.71.143.234\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=89.67.21.124 ::: serverIP=144.71.143.234 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "clicksapp.net",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-23T15:56:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsPotentially Harmful",
"streamName": "OpenDNS Detection",
"clientIP": "89.67.21.124",
"serverIP": "144.71.143.234",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"89.67.21.124","externalIp":"144.71.143.234","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=89.67.21.124 ::: serverIP=144.71.143.234 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"89.67.21.124","externalIp":"144.71.143.234","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=89.67.21.124 ::: serverIP=144.71.143.234 ::: userName=nighthawk ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: clicksapp.net
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: clicksapp.net
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-23T15:56:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsPotentially Harmful
streamName: OpenDNS Detection
clientIP: 89.67.21.124
serverIP: 144.71.143.234
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"44.178.186.24","externalIp":"15.250.140.74","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=44.178.186.24 ::: serverIP=15.250.140.74 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "clicksapp.net",
"message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"44.178.186.24\",\"externalIp\":\"15.250.140.74\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=44.178.186.24 ::: serverIP=15.250.140.74 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "clicksapp.net",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-23T15:56:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "AdvertisementsPotentially Harmful",
"streamName": "OpenDNS Detection",
"clientIP": "44.178.186.24",
"serverIP": "15.250.140.74",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"44.178.186.24","externalIp":"15.250.140.74","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=44.178.186.24 ::: serverIP=15.250.140.74 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"44.178.186.24","externalIp":"15.250.140.74","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=44.178.186.24 ::: serverIP=15.250.140.74 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: clicksapp.net
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: clicksapp.net
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-23T15:56:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: AdvertisementsPotentially Harmful
streamName: OpenDNS Detection
clientIP: 44.178.186.24
serverIP: 15.250.140.74
userName: alice | Explain this syslog message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.192.129.40 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=192.3.74.35 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.3.74.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:130.211.54.158",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.192.129.40 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=192.3.74.35 spt=37018 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication=\"python-requests/2.28.2\" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.3.74.35 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675766868012 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 37018,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "192.3.74.35",
"serverIP": "5.192.129.40",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.192.129.40 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=192.3.74.35 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.3.74.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.192.129.40 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=192.3.74.35 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=192.3.74.35 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:130.211.54.158', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675766868012
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 37018
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 192.3.74.35
serverIP: 5.192.129.40
userName: - | Explain this syslog message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.221.87.69 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=77.80.143.0 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.80.143.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:130.211.54.158",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.221.87.69 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=77.80.143.0 spt=37018 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication=\"python-requests/2.28.2\" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.80.143.0 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675766868012 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 37018,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "77.80.143.0",
"serverIP": "146.221.87.69",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.221.87.69 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=77.80.143.0 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.80.143.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=146.221.87.69 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=77.80.143.0 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.80.143.0 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:130.211.54.158', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675766868012
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 37018
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 77.80.143.0
serverIP: 146.221.87.69
userName: - | Explain this syslog message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.62.66.181 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=196.114.140.149 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.114.140.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:130.211.54.158",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.62.66.181 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=196.114.140.149 spt=37018 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication=\"python-requests/2.28.2\" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.114.140.149 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675766868012 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 37018,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "196.114.140.149",
"serverIP": "87.62.66.181",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.62.66.181 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=196.114.140.149 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.114.140.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=87.62.66.181 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=196.114.140.149 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=196.114.140.149 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:130.211.54.158', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675766868012
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 37018
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 196.114.140.149
serverIP: 87.62.66.181
userName: - | Explain this syslog message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.44.217.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=202.83.131.102 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=202.83.131.102 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:130.211.54.158",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.44.217.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=202.83.131.102 spt=37018 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication=\"python-requests/2.28.2\" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=202.83.131.102 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675766868012 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 37018,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "202.83.131.102",
"serverIP": "91.44.217.212",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.44.217.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=202.83.131.102 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=202.83.131.102 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=91.44.217.212 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=202.83.131.102 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=202.83.131.102 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:130.211.54.158', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675766868012
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 37018
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 202.83.131.102
serverIP: 91.44.217.212
userName: - | Explain this syslog message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=157.127.209.214 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=26.158.99.97 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.158.99.97 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:130.211.54.158",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=157.127.209.214 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=26.158.99.97 spt=37018 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication=\"python-requests/2.28.2\" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.158.99.97 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675766868012 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 37018,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "26.158.99.97",
"serverIP": "157.127.209.214",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=157.127.209.214 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=26.158.99.97 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.158.99.97 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 7 04:47:48 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=157.127.209.214 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=26.158.99.97 spt=37018 requestMethod=GET app=HTTP requestContext="-" start=Feb 07 2023 04:47:48 rt=1675766868012 request=/ requestClientApplication="python-requests/2.28.2" dvchost=WAFirewall externalId=1862b7d2822-cfb52cf cn2=37018 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=26.158.99.97 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:130.211.54.158', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675766868012
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 37018
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 26.158.99.97
serverIP: 157.127.209.214
userName: - | Explain this syslog message |
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=154.189.184.55 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=176.20.224.174 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=176.20.224.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"REMOTE_FILE_INCLUSION",
"cef",
"ProxyIP:66.249.79.240",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=154.189.184.55 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"https\\\\:/\" Parameter\\=\"F\" value\\=\"https\\\\://zohsex.xyz/nude/515-websites-to-find-escorts.php \"] duser=\"-\" src=176.20.224.174 spt=38341 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=176.20.224.174 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1662043123877 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "REMOTE_FILE_INCLUSION",
"severitycode": 9,
"fqdn": "/comm/AndarTrack.jsp",
"clientport": 38341,
"vendorcode": "164",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "176.20.224.174",
"serverIP": "154.189.184.55",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=154.189.184.55 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=176.20.224.174 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=176.20.224.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=154.189.184.55 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=176.20.224.174 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=176.20.224.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'ProxyIP:66.249.79.240', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1662043123877
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: REMOTE_FILE_INCLUSION
severitycode: 9
fqdn: /comm/AndarTrack.jsp
clientport: 38341
vendorcode: 164
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 176.20.224.174
serverIP: 154.189.184.55
userName: - | Explain this syslog message |
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=173.163.252.19 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=205.62.11.78 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=205.62.11.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"REMOTE_FILE_INCLUSION",
"cef",
"ProxyIP:66.249.79.240",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=173.163.252.19 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"https\\\\:/\" Parameter\\=\"F\" value\\=\"https\\\\://zohsex.xyz/nude/515-websites-to-find-escorts.php \"] duser=\"-\" src=205.62.11.78 spt=38341 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=205.62.11.78 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1662043123877 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "REMOTE_FILE_INCLUSION",
"severitycode": 9,
"fqdn": "/comm/AndarTrack.jsp",
"clientport": 38341,
"vendorcode": "164",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "205.62.11.78",
"serverIP": "173.163.252.19",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=173.163.252.19 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=205.62.11.78 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=205.62.11.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=173.163.252.19 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=205.62.11.78 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=205.62.11.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'ProxyIP:66.249.79.240', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1662043123877
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: REMOTE_FILE_INCLUSION
severitycode: 9
fqdn: /comm/AndarTrack.jsp
clientport: 38341
vendorcode: 164
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 205.62.11.78
serverIP: 173.163.252.19
userName: - | Explain this syslog message |
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=191.223.212.174 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=131.170.59.96 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=131.170.59.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"REMOTE_FILE_INCLUSION",
"cef",
"ProxyIP:66.249.79.240",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=191.223.212.174 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"https\\\\:/\" Parameter\\=\"F\" value\\=\"https\\\\://zohsex.xyz/nude/515-websites-to-find-escorts.php \"] duser=\"-\" src=131.170.59.96 spt=38341 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=131.170.59.96 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1662043123877 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "REMOTE_FILE_INCLUSION",
"severitycode": 9,
"fqdn": "/comm/AndarTrack.jsp",
"clientport": 38341,
"vendorcode": "164",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "131.170.59.96",
"serverIP": "191.223.212.174",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=191.223.212.174 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=131.170.59.96 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=131.170.59.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 1 09:38:43 WAFirewall CEF:0|Barracuda|WAF|1101|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=191.223.212.174 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="https\\:/" Parameter\="F" value\="https\\://zohsex.xyz/nude/515-websites-to-find-escorts.php "] duser="-" src=131.170.59.96 spt=38341 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 01 2022 09:38:43 rt=1662043123877 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" dvchost=WAFirewall externalId=182f97d7094-dfa69427 cn2=38341 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=131.170.59.96 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'ProxyIP:66.249.79.240', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
productids: [0]
sourceinfo: unknown
localstarttime: 1662043123877
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: REMOTE_FILE_INCLUSION
severitycode: 9
fqdn: /comm/AndarTrack.jsp
clientport: 38341
vendorcode: 164
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 131.170.59.96
serverIP: 191.223.212.174
userName: - | Explain this syslog message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=4.39.105.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=119.52.39.122 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=119.52.39.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45932,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1704432226032 ",
"message": "<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=4.39.105.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=119.52.39.122 spt=45932 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=119.52.39.122 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:94.102.61.7"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "119.52.39.122",
"serverIP": "4.39.105.241",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=4.39.105.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=119.52.39.122 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=119.52.39.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=4.39.105.241 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=119.52.39.122 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=119.52.39.122 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45932
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1704432226032
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7']
vendorcode: 342
streamName: barracuda_waf
clientIP: 119.52.39.122
serverIP: 4.39.105.241
userName: - | Explain this syslog message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=155.35.176.91 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=61.22.153.26 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=61.22.153.26 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45932,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1704432226032 ",
"message": "<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=155.35.176.91 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=61.22.153.26 spt=45932 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=61.22.153.26 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:94.102.61.7"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "61.22.153.26",
"serverIP": "155.35.176.91",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=155.35.176.91 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=61.22.153.26 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=61.22.153.26 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=155.35.176.91 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=61.22.153.26 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=61.22.153.26 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45932
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1704432226032
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7']
vendorcode: 342
streamName: barracuda_waf
clientIP: 61.22.153.26
serverIP: 155.35.176.91
userName: - | Explain this syslog message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.232.167.55 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=44.86.11.94 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.86.11.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45932,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1704432226032 ",
"message": "<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.232.167.55 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=44.86.11.94 spt=45932 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.86.11.94 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:94.102.61.7"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "44.86.11.94",
"serverIP": "46.232.167.55",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.232.167.55 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=44.86.11.94 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.86.11.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=46.232.167.55 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=44.86.11.94 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.86.11.94 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45932
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1704432226032
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7']
vendorcode: 342
streamName: barracuda_waf
clientIP: 44.86.11.94
serverIP: 46.232.167.55
userName: - | Explain this syslog message |
<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=221.88.231.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=34.103.129.37 spt=59102 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.103.129.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59102,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1704432294501 ",
"message": "<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=221.88.231.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=34.103.129.37 spt=59102 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.103.129.37 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:94.102.61.7"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "34.103.129.37",
"serverIP": "221.88.231.16",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=221.88.231.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=34.103.129.37 spt=59102 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.103.129.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=221.88.231.16 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=34.103.129.37 spt=59102 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=34.103.129.37 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59102
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1704432294501
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7']
vendorcode: 342
streamName: barracuda_waf
clientIP: 34.103.129.37
serverIP: 221.88.231.16
userName: - | Explain this syslog message |
<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=85.17.63.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=101.141.27.107 spt=59102 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=101.141.27.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 59102,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1704432294501 ",
"message": "<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=85.17.63.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=101.141.27.107 spt=59102 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=101.141.27.107 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:94.102.61.7"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "101.141.27.107",
"serverIP": "85.17.63.73",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=85.17.63.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=101.141.27.107 spt=59102 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=101.141.27.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 4 23:24:54 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=85.17.63.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=101.141.27.107 spt=59102 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:24:54 rt=1704432294501 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd814da65-a5957c78 cn2=59102 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=101.141.27.107 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 59102
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1704432294501
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7']
vendorcode: 342
streamName: barracuda_waf
clientIP: 101.141.27.107
serverIP: 85.17.63.73
userName: - | Explain this syslog message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=255.187.94.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.74.184.219 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.74.184.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45932,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1704432226032 ",
"message": "<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=255.187.94.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=0.74.184.219 spt=45932 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.74.184.219 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:94.102.61.7"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "0.74.184.219",
"serverIP": "255.187.94.33",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=255.187.94.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.74.184.219 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.74.184.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=255.187.94.33 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=0.74.184.219 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=0.74.184.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45932
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1704432226032
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7']
vendorcode: 342
streamName: barracuda_waf
clientIP: 0.74.184.219
serverIP: 255.187.94.33
userName: - | Explain this syslog message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=9.121.17.49 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=197.87.67.251 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.87.67.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45932,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1704432226032 ",
"message": "<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=9.121.17.49 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=197.87.67.251 spt=45932 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36\" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.87.67.251 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:94.102.61.7"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "197.87.67.251",
"serverIP": "9.121.17.49",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=9.121.17.49 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=197.87.67.251 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.87.67.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 4 23:23:46 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=9.121.17.49 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=197.87.67.251 spt=45932 requestMethod=GET app=TLSv1.2 requestContext="-" start=Jan 04 2024 23:23:46 rt=1704432226032 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" dvchost=WAFirewall externalId=18cd813cebd-af91c45c cn2=45932 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=197.87.67.251 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45932
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1704432226032
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:94.102.61.7']
vendorcode: 342
streamName: barracuda_waf
clientIP: 197.87.67.251
serverIP: 9.121.17.49
userName: - | Explain this syslog message |
<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=50.89.109.207 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=185.89.108.151 spt=36044 requestMethod=GET app=HTTP requestContext="-" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication="Unknown" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.89.108.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:138.197.159.145",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=50.89.109.207 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=185.89.108.151 spt=36044 requestMethod=GET app=HTTP requestContext=\"-\" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.89.108.151 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1671752051056 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/wp-admin/style.php",
"clientport": 36044,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "185.89.108.151",
"serverIP": "50.89.109.207",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=50.89.109.207 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=185.89.108.151 spt=36044 requestMethod=GET app=HTTP requestContext="-" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication="Unknown" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.89.108.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=50.89.109.207 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=185.89.108.151 spt=36044 requestMethod=GET app=HTTP requestContext="-" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication="Unknown" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=185.89.108.151 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:138.197.159.145', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1671752051056
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /wp-admin/style.php
clientport: 36044
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 185.89.108.151
serverIP: 50.89.109.207
userName: - | Explain this syslog message |
<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.175.87.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=201.130.51.224 spt=36044 requestMethod=GET app=HTTP requestContext="-" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication="Unknown" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.130.51.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:138.197.159.145",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.175.87.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=201.130.51.224 spt=36044 requestMethod=GET app=HTTP requestContext=\"-\" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.130.51.224 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1671752051056 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/wp-admin/style.php",
"clientport": 36044,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "201.130.51.224",
"serverIP": "134.175.87.146",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.175.87.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=201.130.51.224 spt=36044 requestMethod=GET app=HTTP requestContext="-" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication="Unknown" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.130.51.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 22 17:34:11 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=134.175.87.146 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=201.130.51.224 spt=36044 requestMethod=GET app=HTTP requestContext="-" start=Dec 22 2022 17:34:11 rt=1671752051056 request=/wp-admin/style.php requestClientApplication="Unknown" dvchost=WAFirewall externalId=1853c2fe962-53c411f6 cn2=36044 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.130.51.224 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:138.197.159.145', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1671752051056
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /wp-admin/style.php
clientport: 36044
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 201.130.51.224
serverIP: 134.175.87.146
userName: - | Explain this syslog message |
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=214.187.109.72 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=52.27.164.139 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.27.164.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:114.119.138.199",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=214.187.109.72 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=52.27.164.139 spt=62361 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.27.164.139 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1665907009267 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/robots.txt",
"clientport": 62361,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "52.27.164.139",
"serverIP": "214.187.109.72",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=214.187.109.72 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=52.27.164.139 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.27.164.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=214.187.109.72 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=52.27.164.139 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=52.27.164.139 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:114.119.138.199', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1665907009267
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /robots.txt
clientport: 62361
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 52.27.164.139
serverIP: 214.187.109.72
userName: - | Explain this syslog message |
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=234.92.7.67 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=17.176.217.141 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.176.217.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:114.119.138.199",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=234.92.7.67 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=17.176.217.141 spt=62361 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.176.217.141 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1665907009267 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/robots.txt",
"clientport": 62361,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "17.176.217.141",
"serverIP": "234.92.7.67",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=234.92.7.67 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=17.176.217.141 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.176.217.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=234.92.7.67 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=17.176.217.141 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=17.176.217.141 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:114.119.138.199', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1665907009267
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /robots.txt
clientport: 62361
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 17.176.217.141
serverIP: 234.92.7.67
userName: - | Explain this syslog message |
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=124.123.254.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=30.114.28.91 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.114.28.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:114.119.138.199",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=124.123.254.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=30.114.28.91 spt=62361 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication=\"Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)\" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.114.28.91 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1665907009267 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/robots.txt",
"clientport": 62361,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "30.114.28.91",
"serverIP": "124.123.254.93",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=124.123.254.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=30.114.28.91 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.114.28.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 02:56:49 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=124.123.254.93 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=30.114.28.91 spt=62361 requestMethod=GET app=TLSv1.3 requestContext="-" start=Oct 16 2022 02:56:49 rt=1665907009267 request=/robots.txt requestClientApplication="Mozilla/5.0 (compatible;PetalBot;+https://webmaster.petalsearch.com/site/petalbot)" dvchost=WAFirewall externalId=183dfcba6c4-16c44578 cn2=62361 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.114.28.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:114.119.138.199', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1665907009267
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /robots.txt
clientport: 62361
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 30.114.28.91
serverIP: 124.123.254.93
userName: - | Explain this syslog message |
<132>Dec 23 17:07:59 ip-10-1-16-76 drupal: https://shareholders.stark.com|1703351279|access denied|197.188.69.194|https://shareholders.stark.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "ip-10-1-16-76",
"localstarttime": "Dec 23 17:07:59",
"message": "<132>Dec 23 17:07:59 ip-10-1-16-76 drupal: https://shareholders.stark.com|1703351279|access denied|197.188.69.194|https://shareholders.stark.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1703351279",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "197.188.69.194"
} | Create a JSON artifact from the message |
<132>Dec 23 17:07:59 ip-10-1-16-76 drupal: https://shareholders.stark.com|1703351279|access denied|197.188.69.194|https://shareholders.stark.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Dec 23 17:07:59 ip-10-1-16-76 drupal: https://shareholders.stark.com|1703351279|access denied|197.188.69.194|https://shareholders.stark.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: ip-10-1-16-76
localstarttime: Dec 23 17:07:59
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1703351279
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 197.188.69.194 | Explain this syslog message |
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=61.168.138.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.83.150.252 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.83.150.252 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:185.174.159.20",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=61.168.138.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=131.83.150.252 spt=61071 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication=\"Python-urllib/3.10\" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.83.150.252 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1657550294442 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/remote/fgt_lang",
"clientport": 61071,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "131.83.150.252",
"serverIP": "61.168.138.80",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=61.168.138.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.83.150.252 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.83.150.252 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=61.168.138.80 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=131.83.150.252 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=131.83.150.252 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:185.174.159.20', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1657550294442
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /remote/fgt_lang
clientport: 61071
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 131.83.150.252
serverIP: 61.168.138.80
userName: - | Explain this syslog message |
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=173.18.74.107 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=11.190.140.2 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.190.140.2 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:185.174.159.20",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=173.18.74.107 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=11.190.140.2 spt=61071 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication=\"Python-urllib/3.10\" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.190.140.2 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1657550294442 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/remote/fgt_lang",
"clientport": 61071,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "11.190.140.2",
"serverIP": "173.18.74.107",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=173.18.74.107 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=11.190.140.2 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.190.140.2 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.