input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Dec 14 03:37:44 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.77.115.34 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=212.107.41.5 spt=60485 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org start=Dec 14 2023 03:37:44 rt=1702546664006 request=/selma requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36" dvchost=WAFirewall externalId=18c67b06a13-dcd052dd cn2=60485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=212.107.41.5 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 60485,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/selma",
"localhostname": "WAFirewall",
"localstarttime": "1702546664006 ",
"message": "<185>Dec 14 03:37:44 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.77.115.34 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=212.107.41.5 spt=60485 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org start=Dec 14 2023 03:37:44 rt=1702546664006 request=/selma requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36\" dvchost=WAFirewall externalId=18c67b06a13-dcd052dd cn2=60485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=212.107.41.5 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:163.172.18.192",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "212.107.41.5",
"serverIP": "121.77.115.34",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 14 03:37:44 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.77.115.34 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=212.107.41.5 spt=60485 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org start=Dec 14 2023 03:37:44 rt=1702546664006 request=/selma requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36" dvchost=WAFirewall externalId=18c67b06a13-dcd052dd cn2=60485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=212.107.41.5 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 14 03:37:44 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=121.77.115.34 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=212.107.41.5 spt=60485 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org start=Dec 14 2023 03:37:44 rt=1702546664006 request=/selma requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36" dvchost=WAFirewall externalId=18c67b06a13-dcd052dd cn2=60485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=212.107.41.5 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 60485
facilitycode: 23
facilitylabel: local7
fqdn: /selma
localhostname: WAFirewall
localstarttime: 1702546664006
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:163.172.18.192', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 212.107.41.5
serverIP: 121.77.115.34
userName: - | Explain this syslog message |
<185>Dec 14 03:37:44 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=29.103.0.2 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=155.66.87.19 spt=60485 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org start=Dec 14 2023 03:37:44 rt=1702546664006 request=/selma requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36" dvchost=WAFirewall externalId=18c67b06a13-dcd052dd cn2=60485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.66.87.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 60485,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/selma",
"localhostname": "WAFirewall",
"localstarttime": "1702546664006 ",
"message": "<185>Dec 14 03:37:44 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=29.103.0.2 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=155.66.87.19 spt=60485 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org start=Dec 14 2023 03:37:44 rt=1702546664006 request=/selma requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36\" dvchost=WAFirewall externalId=18c67b06a13-dcd052dd cn2=60485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.66.87.19 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:163.172.18.192",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "155.66.87.19",
"serverIP": "29.103.0.2",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 14 03:37:44 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=29.103.0.2 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=155.66.87.19 spt=60485 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org start=Dec 14 2023 03:37:44 rt=1702546664006 request=/selma requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36" dvchost=WAFirewall externalId=18c67b06a13-dcd052dd cn2=60485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.66.87.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 14 03:37:44 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=29.103.0.2 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=155.66.87.19 spt=60485 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org start=Dec 14 2023 03:37:44 rt=1702546664006 request=/selma requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36" dvchost=WAFirewall externalId=18c67b06a13-dcd052dd cn2=60485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=155.66.87.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 60485
facilitycode: 23
facilitylabel: local7
fqdn: /selma
localhostname: WAFirewall
localstarttime: 1702546664006
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:163.172.18.192', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 155.66.87.19
serverIP: 29.103.0.2
userName: - | Explain this syslog message |
<185>Dec 14 03:37:44 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.9.119.132 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=237.42.36.69 spt=60485 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org start=Dec 14 2023 03:37:44 rt=1702546664006 request=/selma requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36" dvchost=WAFirewall externalId=18c67b06a13-dcd052dd cn2=60485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.42.36.69 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 60485,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/selma",
"localhostname": "WAFirewall",
"localstarttime": "1702546664006 ",
"message": "<185>Dec 14 03:37:44 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.9.119.132 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=237.42.36.69 spt=60485 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org start=Dec 14 2023 03:37:44 rt=1702546664006 request=/selma requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36\" dvchost=WAFirewall externalId=18c67b06a13-dcd052dd cn2=60485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.42.36.69 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:163.172.18.192",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "237.42.36.69",
"serverIP": "77.9.119.132",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Dec 14 03:37:44 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.9.119.132 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=237.42.36.69 spt=60485 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org start=Dec 14 2023 03:37:44 rt=1702546664006 request=/selma requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36" dvchost=WAFirewall externalId=18c67b06a13-dcd052dd cn2=60485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.42.36.69 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Dec 14 03:37:44 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.9.119.132 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=237.42.36.69 spt=60485 requestMethod=GET app=TLSv1.2 requestContext=https://uweb1.unitedwayeservice.org start=Dec 14 2023 03:37:44 rt=1702546664006 request=/selma requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36" dvchost=WAFirewall externalId=18c67b06a13-dcd052dd cn2=60485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.42.36.69 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 60485
facilitycode: 23
facilitylabel: local7
fqdn: /selma
localhostname: WAFirewall
localstarttime: 1702546664006
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:163.172.18.192', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 237.42.36.69
serverIP: 77.9.119.132
userName: - | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-27T18:18:38.604Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-27T18:18:39.139Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t50.119.181.254\n\tSource Port:\t\t45532\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"50.119.181.254","IpPort":"45532","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":24080}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6714215486,"task":"Logon"}} | {
"action": "Logon",
"clientport": 45532,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-27T18:18:38.604Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-27T18:18:39.139Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t50.119.181.254\\n\\tSource Port:\\t\\t45532\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"50.119.181.254\",\"IpPort\":\"45532\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":24080}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6714215486,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6714215486",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "50.119.181.254",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-27T18:18:38.604Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-27T18:18:39.139Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t50.119.181.254\n\tSource Port:\t\t45532\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"50.119.181.254","IpPort":"45532","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":24080}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6714215486,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-27T18:18:38.604Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-27T18:18:39.139Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t50.119.181.254\n\tSource Port:\t\t45532\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"50.119.181.254","IpPort":"45532","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":24080}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6714215486,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 45532
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6714215486
streamName: microsoft-windows-security-auditing
clientIP: 50.119.181.254
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-27T18:18:38.604Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-27T18:18:39.139Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t207.255.87.61\n\tSource Port:\t\t45532\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"207.255.87.61","IpPort":"45532","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":24080}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6714215486,"task":"Logon"}} | {
"action": "Logon",
"clientport": 45532,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-27T18:18:38.604Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-27T18:18:39.139Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t207.255.87.61\\n\\tSource Port:\\t\\t45532\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"207.255.87.61\",\"IpPort\":\"45532\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":24080}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6714215486,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6714215486",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "207.255.87.61",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-27T18:18:38.604Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-27T18:18:39.139Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t207.255.87.61\n\tSource Port:\t\t45532\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"207.255.87.61","IpPort":"45532","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":24080}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6714215486,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-27T18:18:38.604Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-27T18:18:39.139Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t207.255.87.61\n\tSource Port:\t\t45532\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"207.255.87.61","IpPort":"45532","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":24080}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6714215486,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 45532
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6714215486
streamName: microsoft-windows-security-auditing
clientIP: 207.255.87.61
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-27T18:18:38.604Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-27T18:18:39.139Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t150.5.93.55\n\tSource Port:\t\t45532\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"150.5.93.55","IpPort":"45532","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":24080}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6714215486,"task":"Logon"}} | {
"action": "Logon",
"clientport": 45532,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-27T18:18:38.604Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-27T18:18:39.139Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t150.5.93.55\\n\\tSource Port:\\t\\t45532\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"150.5.93.55\",\"IpPort\":\"45532\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":24080}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6714215486,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6714215486",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "150.5.93.55",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-27T18:18:38.604Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-27T18:18:39.139Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t150.5.93.55\n\tSource Port:\t\t45532\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"150.5.93.55","IpPort":"45532","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":24080}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6714215486,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-27T18:18:38.604Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-27T18:18:39.139Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t150.5.93.55\n\tSource Port:\t\t45532\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"150.5.93.55","IpPort":"45532","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":24080}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6714215486,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 45532
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6714215486
streamName: microsoft-windows-security-auditing
clientIP: 150.5.93.55
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-27T18:18:38.604Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-27T18:18:39.139Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t174.240.25.217\n\tSource Port:\t\t45532\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"174.240.25.217","IpPort":"45532","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":24080}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6714215486,"task":"Logon"}} | {
"action": "Logon",
"clientport": 45532,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-27T18:18:38.604Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-27T18:18:39.139Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t174.240.25.217\\n\\tSource Port:\\t\\t45532\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"174.240.25.217\",\"IpPort\":\"45532\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":24080}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6714215486,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6714215486",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "174.240.25.217",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-27T18:18:38.604Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-27T18:18:39.139Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t174.240.25.217\n\tSource Port:\t\t45532\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"174.240.25.217","IpPort":"45532","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":24080}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6714215486,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-27T18:18:38.604Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-27T18:18:39.139Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t174.240.25.217\n\tSource Port:\t\t45532\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"174.240.25.217","IpPort":"45532","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":24080}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6714215486,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 45532
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6714215486
streamName: microsoft-windows-security-auditing
clientIP: 174.240.25.217
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"172.12.107.176","externalIp":"78.130.100.253","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=172.12.107.176 ::: serverIP=78.130.100.253 ::: userName=janedoe ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:57:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"172.12.107.176\",\"externalIp\":\"78.130.100.253\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:57:28.000Z\"} ::: clientIP=172.12.107.176 ::: serverIP=78.130.100.253 ::: userName=janedoe ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "172.12.107.176",
"serverIP": "78.130.100.253",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"172.12.107.176","externalIp":"78.130.100.253","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=172.12.107.176 ::: serverIP=78.130.100.253 ::: userName=janedoe ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"172.12.107.176","externalIp":"78.130.100.253","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=172.12.107.176 ::: serverIP=78.130.100.253 ::: userName=janedoe ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:57:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 172.12.107.176
serverIP: 78.130.100.253
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"117.219.189.110","externalIp":"37.239.222.158","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=117.219.189.110 ::: serverIP=37.239.222.158 ::: userName=alice ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:57:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"117.219.189.110\",\"externalIp\":\"37.239.222.158\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:57:28.000Z\"} ::: clientIP=117.219.189.110 ::: serverIP=37.239.222.158 ::: userName=alice ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "117.219.189.110",
"serverIP": "37.239.222.158",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"117.219.189.110","externalIp":"37.239.222.158","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=117.219.189.110 ::: serverIP=37.239.222.158 ::: userName=alice ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"117.219.189.110","externalIp":"37.239.222.158","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=117.219.189.110 ::: serverIP=37.239.222.158 ::: userName=alice ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:57:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 117.219.189.110
serverIP: 37.239.222.158
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"14.43.155.119","externalIp":"6.219.97.6","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=14.43.155.119 ::: serverIP=6.219.97.6 ::: userName=janedoe ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:52:09.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"14.43.155.119\",\"externalIp\":\"6.219.97.6\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:52:09.000Z\"} ::: clientIP=14.43.155.119 ::: serverIP=6.219.97.6 ::: userName=janedoe ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "14.43.155.119",
"serverIP": "6.219.97.6",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"14.43.155.119","externalIp":"6.219.97.6","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=14.43.155.119 ::: serverIP=6.219.97.6 ::: userName=janedoe ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"14.43.155.119","externalIp":"6.219.97.6","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=14.43.155.119 ::: serverIP=6.219.97.6 ::: userName=janedoe ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:52:09.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 14.43.155.119
serverIP: 6.219.97.6
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"64.238.170.152","externalIp":"219.0.236.1","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=64.238.170.152 ::: serverIP=219.0.236.1 ::: userName=alice ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:52:09.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"64.238.170.152\",\"externalIp\":\"219.0.236.1\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:52:09.000Z\"} ::: clientIP=64.238.170.152 ::: serverIP=219.0.236.1 ::: userName=alice ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "64.238.170.152",
"serverIP": "219.0.236.1",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"64.238.170.152","externalIp":"219.0.236.1","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=64.238.170.152 ::: serverIP=219.0.236.1 ::: userName=alice ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"64.238.170.152","externalIp":"219.0.236.1","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=64.238.170.152 ::: serverIP=219.0.236.1 ::: userName=alice ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:52:09.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 64.238.170.152
serverIP: 219.0.236.1
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"91.46.127.194","externalIp":"220.150.240.3","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=91.46.127.194 ::: serverIP=220.150.240.3 ::: userName=fish ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:57:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"91.46.127.194\",\"externalIp\":\"220.150.240.3\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:57:28.000Z\"} ::: clientIP=91.46.127.194 ::: serverIP=220.150.240.3 ::: userName=fish ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "91.46.127.194",
"serverIP": "220.150.240.3",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"91.46.127.194","externalIp":"220.150.240.3","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=91.46.127.194 ::: serverIP=220.150.240.3 ::: userName=fish ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"91.46.127.194","externalIp":"220.150.240.3","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=91.46.127.194 ::: serverIP=220.150.240.3 ::: userName=fish ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:57:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 91.46.127.194
serverIP: 220.150.240.3
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"8.144.242.182","externalIp":"142.116.39.57","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=8.144.242.182 ::: serverIP=142.116.39.57 ::: userName=nighthawk ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:57:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"8.144.242.182\",\"externalIp\":\"142.116.39.57\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:57:28.000Z\"} ::: clientIP=8.144.242.182 ::: serverIP=142.116.39.57 ::: userName=nighthawk ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "8.144.242.182",
"serverIP": "142.116.39.57",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"8.144.242.182","externalIp":"142.116.39.57","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=8.144.242.182 ::: serverIP=142.116.39.57 ::: userName=nighthawk ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"8.144.242.182","externalIp":"142.116.39.57","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=8.144.242.182 ::: serverIP=142.116.39.57 ::: userName=nighthawk ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:57:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 8.144.242.182
serverIP: 142.116.39.57
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"202.57.250.68","externalIp":"45.187.18.204","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=202.57.250.68 ::: serverIP=45.187.18.204 ::: userName=charlie ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:52:09.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"202.57.250.68\",\"externalIp\":\"45.187.18.204\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:52:09.000Z\"} ::: clientIP=202.57.250.68 ::: serverIP=45.187.18.204 ::: userName=charlie ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "202.57.250.68",
"serverIP": "45.187.18.204",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"202.57.250.68","externalIp":"45.187.18.204","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=202.57.250.68 ::: serverIP=45.187.18.204 ::: userName=charlie ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"202.57.250.68","externalIp":"45.187.18.204","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=202.57.250.68 ::: serverIP=45.187.18.204 ::: userName=charlie ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:52:09.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 202.57.250.68
serverIP: 45.187.18.204
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"195.253.134.12","externalIp":"20.153.65.221","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=195.253.134.12 ::: serverIP=20.153.65.221 ::: userName=nighthawk ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:52:09.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"195.253.134.12\",\"externalIp\":\"20.153.65.221\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:52:09.000Z\"} ::: clientIP=195.253.134.12 ::: serverIP=20.153.65.221 ::: userName=nighthawk ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "195.253.134.12",
"serverIP": "20.153.65.221",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"195.253.134.12","externalIp":"20.153.65.221","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=195.253.134.12 ::: serverIP=20.153.65.221 ::: userName=nighthawk ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"195.253.134.12","externalIp":"20.153.65.221","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=195.253.134.12 ::: serverIP=20.153.65.221 ::: userName=nighthawk ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:52:09.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 195.253.134.12
serverIP: 20.153.65.221
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"169.150.31.111","externalIp":"118.130.219.221","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=169.150.31.111 ::: serverIP=118.130.219.221 ::: userName=johndoe ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:57:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"169.150.31.111\",\"externalIp\":\"118.130.219.221\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:57:28.000Z\"} ::: clientIP=169.150.31.111 ::: serverIP=118.130.219.221 ::: userName=johndoe ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "169.150.31.111",
"serverIP": "118.130.219.221",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"169.150.31.111","externalIp":"118.130.219.221","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=169.150.31.111 ::: serverIP=118.130.219.221 ::: userName=johndoe ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"169.150.31.111","externalIp":"118.130.219.221","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=169.150.31.111 ::: serverIP=118.130.219.221 ::: userName=johndoe ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:57:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 169.150.31.111
serverIP: 118.130.219.221
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"139.227.211.48","externalIp":"37.128.60.53","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=139.227.211.48 ::: serverIP=37.128.60.53 ::: userName=janedoe ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:57:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"139.227.211.48\",\"externalIp\":\"37.128.60.53\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:57:28.000Z\"} ::: clientIP=139.227.211.48 ::: serverIP=37.128.60.53 ::: userName=janedoe ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "139.227.211.48",
"serverIP": "37.128.60.53",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"139.227.211.48","externalIp":"37.128.60.53","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=139.227.211.48 ::: serverIP=37.128.60.53 ::: userName=janedoe ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"139.227.211.48","externalIp":"37.128.60.53","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:57:28.000Z"} ::: clientIP=139.227.211.48 ::: serverIP=37.128.60.53 ::: userName=janedoe ::: created_at=2022-05-26T15:57:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:57:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:57:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 139.227.211.48
serverIP: 37.128.60.53
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"103.20.67.83","externalIp":"252.240.3.249","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=103.20.67.83 ::: serverIP=252.240.3.249 ::: userName=janedoe ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:52:09.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"103.20.67.83\",\"externalIp\":\"252.240.3.249\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:52:09.000Z\"} ::: clientIP=103.20.67.83 ::: serverIP=252.240.3.249 ::: userName=janedoe ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "103.20.67.83",
"serverIP": "252.240.3.249",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"103.20.67.83","externalIp":"252.240.3.249","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=103.20.67.83 ::: serverIP=252.240.3.249 ::: userName=janedoe ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"103.20.67.83","externalIp":"252.240.3.249","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=103.20.67.83 ::: serverIP=252.240.3.249 ::: userName=janedoe ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:52:09.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 103.20.67.83
serverIP: 252.240.3.249
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"106.73.182.71","externalIp":"77.14.70.62","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=106.73.182.71 ::: serverIP=77.14.70.62 ::: userName=charlie ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:52:09.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"106.73.182.71\",\"externalIp\":\"77.14.70.62\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:52:09.000Z\"} ::: clientIP=106.73.182.71 ::: serverIP=77.14.70.62 ::: userName=charlie ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "106.73.182.71",
"serverIP": "77.14.70.62",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"106.73.182.71","externalIp":"77.14.70.62","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=106.73.182.71 ::: serverIP=77.14.70.62 ::: userName=charlie ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"106.73.182.71","externalIp":"77.14.70.62","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-26T15:52:09.000Z"} ::: clientIP=106.73.182.71 ::: serverIP=77.14.70.62 ::: userName=charlie ::: created_at=2022-05-26T15:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:52:09.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:52:09.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 106.73.182.71
serverIP: 77.14.70.62
userName: charlie | Explain this syslog message |
<185>Nov 20 13:26:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=17.205.0.39 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=207.37.251.25 spt=46872 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 20 2023 13:26:06 rt=1700508366832 request=/autodiscove/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bee3277f0-156c18c9 cn2=46872 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=207.37.251.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 46872,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/autodiscove/",
"localhostname": "WAFirewall",
"localstarttime": "1700508366832 ",
"message": "<185>Nov 20 13:26:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=17.205.0.39 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=207.37.251.25 spt=46872 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 20 2023 13:26:06 rt=1700508366832 request=/autodiscove/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18bee3277f0-156c18c9 cn2=46872 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=207.37.251.25 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"GEO_IP_BLOCK",
"ProxyIP:34.78.77.213"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "207.37.251.25",
"serverIP": "17.205.0.39",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 20 13:26:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=17.205.0.39 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=207.37.251.25 spt=46872 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 20 2023 13:26:06 rt=1700508366832 request=/autodiscove/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bee3277f0-156c18c9 cn2=46872 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=207.37.251.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 20 13:26:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=17.205.0.39 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=207.37.251.25 spt=46872 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 20 2023 13:26:06 rt=1700508366832 request=/autodiscove/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bee3277f0-156c18c9 cn2=46872 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=207.37.251.25 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46872
facilitycode: 23
facilitylabel: local7
fqdn: /autodiscove/
localhostname: WAFirewall
localstarttime: 1700508366832
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'GEO_IP_BLOCK', 'ProxyIP:34.78.77.213']
vendorcode: 342
streamName: barracuda_waf
clientIP: 207.37.251.25
serverIP: 17.205.0.39
userName: - | Explain this syslog message |
<185>Nov 20 13:26:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.75.179.178 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.252.222.166 spt=46872 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 20 2023 13:26:06 rt=1700508366832 request=/autodiscove/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bee3277f0-156c18c9 cn2=46872 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.252.222.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 46872,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/autodiscove/",
"localhostname": "WAFirewall",
"localstarttime": "1700508366832 ",
"message": "<185>Nov 20 13:26:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.75.179.178 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=158.252.222.166 spt=46872 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 20 2023 13:26:06 rt=1700508366832 request=/autodiscove/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18bee3277f0-156c18c9 cn2=46872 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.252.222.166 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"GEO_IP_BLOCK",
"ProxyIP:34.78.77.213"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "158.252.222.166",
"serverIP": "106.75.179.178",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 20 13:26:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.75.179.178 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.252.222.166 spt=46872 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 20 2023 13:26:06 rt=1700508366832 request=/autodiscove/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bee3277f0-156c18c9 cn2=46872 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.252.222.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 20 13:26:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.75.179.178 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.252.222.166 spt=46872 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 20 2023 13:26:06 rt=1700508366832 request=/autodiscove/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bee3277f0-156c18c9 cn2=46872 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.252.222.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46872
facilitycode: 23
facilitylabel: local7
fqdn: /autodiscove/
localhostname: WAFirewall
localstarttime: 1700508366832
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'GEO_IP_BLOCK', 'ProxyIP:34.78.77.213']
vendorcode: 342
streamName: barracuda_waf
clientIP: 158.252.222.166
serverIP: 106.75.179.178
userName: - | Explain this syslog message |
<185>Nov 20 13:26:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=236.38.183.249 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=211.18.69.125 spt=46872 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 20 2023 13:26:06 rt=1700508366832 request=/autodiscove/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bee3277f0-156c18c9 cn2=46872 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.18.69.125 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 46872,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/autodiscove/",
"localhostname": "WAFirewall",
"localstarttime": "1700508366832 ",
"message": "<185>Nov 20 13:26:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=236.38.183.249 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=211.18.69.125 spt=46872 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 20 2023 13:26:06 rt=1700508366832 request=/autodiscove/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18bee3277f0-156c18c9 cn2=46872 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.18.69.125 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"GEO_IP_BLOCK",
"ProxyIP:34.78.77.213"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "211.18.69.125",
"serverIP": "236.38.183.249",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 20 13:26:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=236.38.183.249 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=211.18.69.125 spt=46872 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 20 2023 13:26:06 rt=1700508366832 request=/autodiscove/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bee3277f0-156c18c9 cn2=46872 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.18.69.125 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 20 13:26:06 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=236.38.183.249 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=211.18.69.125 spt=46872 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 20 2023 13:26:06 rt=1700508366832 request=/autodiscove/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18bee3277f0-156c18c9 cn2=46872 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=211.18.69.125 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46872
facilitycode: 23
facilitylabel: local7
fqdn: /autodiscove/
localhostname: WAFirewall
localstarttime: 1700508366832
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'GEO_IP_BLOCK', 'ProxyIP:34.78.77.213']
vendorcode: 342
streamName: barracuda_waf
clientIP: 211.18.69.125
serverIP: 236.38.183.249
userName: - | Explain this syslog message |
<185>Oct 16 01:13:28 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=155.160.174.134 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=77.16.146.66 spt=52079 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:28 rt=1697436808081 request=/WebServiceImpl/services/Version/getVersion requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e3391-486480bf cn2=52079 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.16.146.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52079,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/WebServiceImpl/services/Version/getVersion",
"localhostname": "WAFirewall",
"localstarttime": "1697436808081 ",
"message": "<185>Oct 16 01:13:28 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=155.160.174.134 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=77.16.146.66 spt=52079 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:13:28 rt=1697436808081 request=/WebServiceImpl/services/Version/getVersion requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b371e3391-486480bf cn2=52079 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.16.146.66 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "77.16.146.66",
"serverIP": "155.160.174.134",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:13:28 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=155.160.174.134 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=77.16.146.66 spt=52079 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:28 rt=1697436808081 request=/WebServiceImpl/services/Version/getVersion requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e3391-486480bf cn2=52079 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.16.146.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:13:28 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=155.160.174.134 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=77.16.146.66 spt=52079 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:28 rt=1697436808081 request=/WebServiceImpl/services/Version/getVersion requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e3391-486480bf cn2=52079 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=77.16.146.66 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52079
facilitycode: 23
facilitylabel: local7
fqdn: /WebServiceImpl/services/Version/getVersion
localhostname: WAFirewall
localstarttime: 1697436808081
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 77.16.146.66
serverIP: 155.160.174.134
userName: - | Explain this syslog message |
<185>Oct 16 01:13:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=206.211.51.247 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=24.92.155.75 spt=32859 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:26 rt=1697436806777 request=/struts/docs/docs/struts2-core-apidocs/overview-summary.html requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e2e78-40610aa6 cn2=32859 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=24.92.155.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 32859,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/struts/docs/docs/struts2-core-apidocs/overview-summary.html",
"localhostname": "WAFirewall",
"localstarttime": "1697436806777 ",
"message": "<185>Oct 16 01:13:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=206.211.51.247 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=24.92.155.75 spt=32859 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:13:26 rt=1697436806777 request=/struts/docs/docs/struts2-core-apidocs/overview-summary.html requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b371e2e78-40610aa6 cn2=32859 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=24.92.155.75 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "24.92.155.75",
"serverIP": "206.211.51.247",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:13:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=206.211.51.247 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=24.92.155.75 spt=32859 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:26 rt=1697436806777 request=/struts/docs/docs/struts2-core-apidocs/overview-summary.html requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e2e78-40610aa6 cn2=32859 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=24.92.155.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:13:26 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=206.211.51.247 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=24.92.155.75 spt=32859 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:26 rt=1697436806777 request=/struts/docs/docs/struts2-core-apidocs/overview-summary.html requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e2e78-40610aa6 cn2=32859 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=24.92.155.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 32859
facilitycode: 23
facilitylabel: local7
fqdn: /struts/docs/docs/struts2-core-apidocs/overview-summary.html
localhostname: WAFirewall
localstarttime: 1697436806777
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 24.92.155.75
serverIP: 206.211.51.247
userName: - | Explain this syslog message |
<185>Oct 16 01:13:24 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=204.183.239.79 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.37.241.218 spt=34321 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:24 rt=1697436804699 request=/geneald/Index2.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e265b-e16b692c cn2=34321 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.37.241.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 34321,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/geneald/Index2.php",
"localhostname": "WAFirewall",
"localstarttime": "1697436804699 ",
"message": "<185>Oct 16 01:13:24 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=204.183.239.79 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=159.37.241.218 spt=34321 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:13:24 rt=1697436804699 request=/geneald/Index2.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b371e265b-e16b692c cn2=34321 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.37.241.218 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "159.37.241.218",
"serverIP": "204.183.239.79",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:13:24 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=204.183.239.79 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.37.241.218 spt=34321 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:24 rt=1697436804699 request=/geneald/Index2.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e265b-e16b692c cn2=34321 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.37.241.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:13:24 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=204.183.239.79 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=159.37.241.218 spt=34321 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:24 rt=1697436804699 request=/geneald/Index2.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e265b-e16b692c cn2=34321 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=159.37.241.218 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 34321
facilitycode: 23
facilitylabel: local7
fqdn: /geneald/Index2.php
localhostname: WAFirewall
localstarttime: 1697436804699
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 159.37.241.218
serverIP: 204.183.239.79
userName: - | Explain this syslog message |
<185>Oct 16 01:13:24 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=181.119.112.65 dpt=80 act=DENY msg=[OPTIONS / RTSP/1.0] duser="-" src=18.149.129.199 spt=45526 requestMethod=OPTIONS app=HTTP requestContext="-" start=Oct 16 2023 01:13:24 rt=1697436804688 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371e2650-d6c5f16 cn2=45526 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=18.149.129.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45526,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1697436804688 ",
"message": "<185>Oct 16 01:13:24 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=181.119.112.65 dpt=80 act=DENY msg=[OPTIONS / RTSP/1.0] duser=\"-\" src=18.149.129.199 spt=45526 requestMethod=OPTIONS app=HTTP requestContext=\"-\" start=Oct 16 2023 01:13:24 rt=1697436804688 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371e2650-d6c5f16 cn2=45526 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=18.149.129.199 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "MALFORMED_VERSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "119",
"streamName": "barracuda_waf",
"clientIP": "18.149.129.199",
"serverIP": "181.119.112.65",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:13:24 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=181.119.112.65 dpt=80 act=DENY msg=[OPTIONS / RTSP/1.0] duser="-" src=18.149.129.199 spt=45526 requestMethod=OPTIONS app=HTTP requestContext="-" start=Oct 16 2023 01:13:24 rt=1697436804688 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371e2650-d6c5f16 cn2=45526 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=18.149.129.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:13:24 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=181.119.112.65 dpt=80 act=DENY msg=[OPTIONS / RTSP/1.0] duser="-" src=18.149.129.199 spt=45526 requestMethod=OPTIONS app=HTTP requestContext="-" start=Oct 16 2023 01:13:24 rt=1697436804688 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371e2650-d6c5f16 cn2=45526 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=18.149.129.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45526
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1697436804688
messagetype: MALFORMED_VERSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 119
streamName: barracuda_waf
clientIP: 18.149.129.199
serverIP: 181.119.112.65
userName: - | Explain this syslog message |
<185>Oct 16 01:13:24 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=95.132.109.91 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=50.47.44.87 spt=40729 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:23 rt=1697436803977 request=/struts/WW/cwiki.apacmee.org/WW/home.html requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e2389-139b2d53 cn2=40729 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=50.47.44.87 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 40729,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/struts/WW/cwiki.apache.org/WW/home.html",
"localhostname": "WAFirewall",
"localstarttime": "1697436803977 ",
"message": "<185>Oct 16 01:13:24 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=95.132.109.91 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=50.47.44.87 spt=40729 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:13:23 rt=1697436803977 request=/struts/WW/cwiki.apacmee.org/WW/home.html requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b371e2389-139b2d53 cn2=40729 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=50.47.44.87 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "50.47.44.87",
"serverIP": "95.132.109.91",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:13:24 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=95.132.109.91 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=50.47.44.87 spt=40729 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:23 rt=1697436803977 request=/struts/WW/cwiki.apacmee.org/WW/home.html requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e2389-139b2d53 cn2=40729 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=50.47.44.87 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:13:24 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=95.132.109.91 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=50.47.44.87 spt=40729 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:23 rt=1697436803977 request=/struts/WW/cwiki.apacmee.org/WW/home.html requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e2389-139b2d53 cn2=40729 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=50.47.44.87 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 40729
facilitycode: 23
facilitylabel: local7
fqdn: /struts/WW/cwiki.apache.org/WW/home.html
localhostname: WAFirewall
localstarttime: 1697436803977
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 50.47.44.87
serverIP: 95.132.109.91
userName: - | Explain this syslog message |
<185>Oct 16 01:13:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.246.242.77 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=100.250.55.171 spt=36505 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:22 rt=1697436802852 request=/cacti/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1f24-3c66ebd3 cn2=36505 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=100.250.55.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 36505,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/cacti/index.php",
"localhostname": "WAFirewall",
"localstarttime": "1697436802852 ",
"message": "<185>Oct 16 01:13:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.246.242.77 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=100.250.55.171 spt=36505 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:13:22 rt=1697436802852 request=/cacti/index.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b371e1f24-3c66ebd3 cn2=36505 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=100.250.55.171 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "100.250.55.171",
"serverIP": "119.246.242.77",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:13:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.246.242.77 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=100.250.55.171 spt=36505 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:22 rt=1697436802852 request=/cacti/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1f24-3c66ebd3 cn2=36505 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=100.250.55.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:13:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.246.242.77 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=100.250.55.171 spt=36505 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:22 rt=1697436802852 request=/cacti/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1f24-3c66ebd3 cn2=36505 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=100.250.55.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 36505
facilitycode: 23
facilitylabel: local7
fqdn: /cacti/index.php
localhostname: WAFirewall
localstarttime: 1697436802852
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 100.250.55.171
serverIP: 119.246.242.77
userName: - | Explain this syslog message |
<185>Oct 16 01:13:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=190.7.168.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.101.115.87 spt=45789 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:22 rt=1697436802410 request=/glpi/ requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1d6a-466743d9 cn2=45789 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.101.115.87 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45789,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/glpi/",
"localhostname": "WAFirewall",
"localstarttime": "1697436802410 ",
"message": "<185>Oct 16 01:13:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=190.7.168.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=65.101.115.87 spt=45789 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:13:22 rt=1697436802410 request=/glpi/ requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b371e1d6a-466743d9 cn2=45789 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.101.115.87 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "65.101.115.87",
"serverIP": "190.7.168.137",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:13:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=190.7.168.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.101.115.87 spt=45789 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:22 rt=1697436802410 request=/glpi/ requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1d6a-466743d9 cn2=45789 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.101.115.87 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:13:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=190.7.168.137 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.101.115.87 spt=45789 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:22 rt=1697436802410 request=/glpi/ requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1d6a-466743d9 cn2=45789 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.101.115.87 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45789
facilitycode: 23
facilitylabel: local7
fqdn: /glpi/
localhostname: WAFirewall
localstarttime: 1697436802410
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 65.101.115.87
serverIP: 190.7.168.137
userName: - | Explain this syslog message |
<185>Oct 16 01:13:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=11.209.7.106 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=41.209.201.226 spt=34265 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:21 rt=1697436801730 request=/index requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1ac2-466942e8 cn2=34265 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=41.209.201.226 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 34265,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/index",
"localhostname": "WAFirewall",
"localstarttime": "1697436801730 ",
"message": "<185>Oct 16 01:13:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=11.209.7.106 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=41.209.201.226 spt=34265 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:13:21 rt=1697436801730 request=/index requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b371e1ac2-466942e8 cn2=34265 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=41.209.201.226 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "41.209.201.226",
"serverIP": "11.209.7.106",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:13:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=11.209.7.106 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=41.209.201.226 spt=34265 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:21 rt=1697436801730 request=/index requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1ac2-466942e8 cn2=34265 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=41.209.201.226 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:13:21 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=11.209.7.106 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=41.209.201.226 spt=34265 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:21 rt=1697436801730 request=/index requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1ac2-466942e8 cn2=34265 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=41.209.201.226 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 34265
facilitycode: 23
facilitylabel: local7
fqdn: /index
localhostname: WAFirewall
localstarttime: 1697436801730
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 41.209.201.226
serverIP: 11.209.7.106
userName: - | Explain this syslog message |
<185>Oct 16 01:13:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=90.164.78.12 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=132.144.35.147 spt=41183 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:20 rt=1697436800898 request=/twg/admin/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1782-456736da cn2=41183 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=132.144.35.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41183,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/twg/admin/index.php",
"localhostname": "WAFirewall",
"localstarttime": "1697436800898 ",
"message": "<185>Oct 16 01:13:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=90.164.78.12 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=132.144.35.147 spt=41183 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:13:20 rt=1697436800898 request=/twg/admin/index.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b371e1782-456736da cn2=41183 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=132.144.35.147 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "132.144.35.147",
"serverIP": "90.164.78.12",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:13:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=90.164.78.12 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=132.144.35.147 spt=41183 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:20 rt=1697436800898 request=/twg/admin/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1782-456736da cn2=41183 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=132.144.35.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:13:20 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=90.164.78.12 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=132.144.35.147 spt=41183 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:20 rt=1697436800898 request=/twg/admin/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1782-456736da cn2=41183 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=132.144.35.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41183
facilitycode: 23
facilitylabel: local7
fqdn: /twg/admin/index.php
localhostname: WAFirewall
localstarttime: 1697436800898
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 132.144.35.147
serverIP: 90.164.78.12
userName: - | Explain this syslog message |
<185>Oct 16 01:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=116.101.117.199 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=103.43.248.19 spt=46757 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:19 rt=1697436799486 request=/scripts/office/ag.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e11fe-40600e9d cn2=46757 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=103.43.248.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 46757,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/scripts/office/ag.cgi",
"localhostname": "WAFirewall",
"localstarttime": "1697436799486 ",
"message": "<185>Oct 16 01:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=116.101.117.199 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=103.43.248.19 spt=46757 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:13:19 rt=1697436799486 request=/scripts/office/ag.cgi requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b371e11fe-40600e9d cn2=46757 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=103.43.248.19 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "103.43.248.19",
"serverIP": "116.101.117.199",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=116.101.117.199 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=103.43.248.19 spt=46757 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:19 rt=1697436799486 request=/scripts/office/ag.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e11fe-40600e9d cn2=46757 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=103.43.248.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=116.101.117.199 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=103.43.248.19 spt=46757 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:19 rt=1697436799486 request=/scripts/office/ag.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e11fe-40600e9d cn2=46757 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=103.43.248.19 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 46757
facilitycode: 23
facilitylabel: local7
fqdn: /scripts/office/ag.cgi
localhostname: WAFirewall
localstarttime: 1697436799486
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 103.43.248.19
serverIP: 116.101.117.199
userName: - | Explain this syslog message |
<185>Oct 16 01:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=61.187.48.149 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=37.115.179.201 spt=48735 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:19 rt=1697436799305 request=/struts-cookbook/index.action requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1149-40914be7 cn2=48735 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.115.179.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48735,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/struts-cookbook/index.action",
"localhostname": "WAFirewall",
"localstarttime": "1697436799305 ",
"message": "<185>Oct 16 01:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=61.187.48.149 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=37.115.179.201 spt=48735 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:13:19 rt=1697436799305 request=/struts-cookbook/index.action requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b371e1149-40914be7 cn2=48735 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.115.179.201 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "37.115.179.201",
"serverIP": "61.187.48.149",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=61.187.48.149 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=37.115.179.201 spt=48735 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:19 rt=1697436799305 request=/struts-cookbook/index.action requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1149-40914be7 cn2=48735 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.115.179.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:13:19 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=61.187.48.149 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=37.115.179.201 spt=48735 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:19 rt=1697436799305 request=/struts-cookbook/index.action requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e1149-40914be7 cn2=48735 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=37.115.179.201 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48735
facilitycode: 23
facilitylabel: local7
fqdn: /struts-cookbook/index.action
localhostname: WAFirewall
localstarttime: 1697436799305
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 37.115.179.201
serverIP: 61.187.48.149
userName: - | Explain this syslog message |
<185>Oct 16 01:13:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=235.99.70.140 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=44.56.13.78 spt=44885 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:13:16 rt=1697436796123 request=/scripts/cbgrn/grn.exe requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371e04db-46603f9c cn2=44885 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.56.13.78 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 44885,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/scripts/cbgrn/grn.exe",
"localhostname": "WAFirewall",
"localstarttime": "1697436796123 ",
"message": "<185>Oct 16 01:13:16 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=235.99.70.140 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=44.56.13.78 spt=44885 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:13:16 rt=1697436796123 request=/scripts/cbgrn/grn.exe requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b371e04db-46603f9c cn2=44885 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=44.56.13.78 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "44.56.13.78",
"serverIP": "235.99.70.140",
"userName": "-"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.