input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Oct 16 01:09:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.218.89.249 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=30.117.219.52 spt=50697 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:52 rt=1697436592724 request=/assets/ requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371aea54-d269c821 cn2=50697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.117.219.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 50697
facilitycode: 23
facilitylabel: local7
fqdn: /assets/
localhostname: WAFirewall
localstarttime: 1697436592724
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 30.117.219.52
serverIP: 175.218.89.249
userName: - | Explain this syslog message |
<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=197.140.186.108 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser="-" src=195.197.37.231 spt=36269 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.197.37.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 36269,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/index.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1697436588448 ",
"message": "<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=197.140.186.108 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser=\"-\" src=195.197.37.231 spt=36269 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.197.37.231 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "MALFORMED_VERSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "119",
"streamName": "barracuda_waf",
"clientIP": "195.197.37.231",
"serverIP": "197.140.186.108",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=197.140.186.108 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser="-" src=195.197.37.231 spt=36269 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.197.37.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=197.140.186.108 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser="-" src=195.197.37.231 spt=36269 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.197.37.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 36269
facilitycode: 23
facilitylabel: local7
fqdn: /index.jsp
localhostname: WAFirewall
localstarttime: 1697436588448
messagetype: MALFORMED_VERSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 119
streamName: barracuda_waf
clientIP: 195.197.37.231
serverIP: 197.140.186.108
userName: - | Explain this syslog message |
<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.146.239.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.113.109.109 spt=42231 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.113.109.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 42231,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/index.py",
"localhostname": "WAFirewall",
"localstarttime": "1697436585953 ",
"message": "<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.146.239.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=154.113.109.109 spt=42231 requestMethod=POST app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.113.109.109 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "154.113.109.109",
"serverIP": "98.146.239.110",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.146.239.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.113.109.109 spt=42231 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.113.109.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.146.239.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.113.109.109 spt=42231 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.113.109.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 42231
facilitycode: 23
facilitylabel: local7
fqdn: /index.py
localhostname: WAFirewall
localstarttime: 1697436585953
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 154.113.109.109
serverIP: 98.146.239.110
userName: - | Explain this syslog message |
<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=37.62.1.57 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser="-" src=5.219.31.243 spt=35047 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=5.219.31.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 35047,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/index.htm",
"localhostname": "WAFirewall",
"localstarttime": "1697436573435 ",
"message": "<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=37.62.1.57 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser=\"-\" src=5.219.31.243 spt=35047 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=5.219.31.243 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "MALFORMED_VERSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "119",
"streamName": "barracuda_waf",
"clientIP": "5.219.31.243",
"serverIP": "37.62.1.57",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=37.62.1.57 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser="-" src=5.219.31.243 spt=35047 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=5.219.31.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=37.62.1.57 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser="-" src=5.219.31.243 spt=35047 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=5.219.31.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35047
facilitycode: 23
facilitylabel: local7
fqdn: /index.htm
localhostname: WAFirewall
localstarttime: 1697436573435
messagetype: MALFORMED_VERSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 119
streamName: barracuda_waf
clientIP: 5.219.31.243
serverIP: 37.62.1.57
userName: - | Explain this syslog message |
<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.79.60.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=220.14.196.114 spt=39189 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.14.196.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 39189,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/index.asp",
"localhostname": "WAFirewall",
"localstarttime": "1697436565598 ",
"message": "<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.79.60.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=220.14.196.114 spt=39189 requestMethod=POST app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.14.196.114 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "220.14.196.114",
"serverIP": "68.79.60.34",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.79.60.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=220.14.196.114 spt=39189 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.14.196.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.79.60.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=220.14.196.114 spt=39189 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.14.196.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 39189
facilitycode: 23
facilitylabel: local7
fqdn: /index.asp
localhostname: WAFirewall
localstarttime: 1697436565598
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 220.14.196.114
serverIP: 68.79.60.34
userName: - | Explain this syslog message |
<185>Oct 16 01:09:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.227.196.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=201.42.210.45 spt=50697 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:52 rt=1697436592724 request=/assets/ requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371aea54-d269c821 cn2=50697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.42.210.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 50697,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/assets/",
"localhostname": "WAFirewall",
"localstarttime": "1697436592724 ",
"message": "<185>Oct 16 01:09:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.227.196.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=201.42.210.45 spt=50697 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:52 rt=1697436592724 request=/assets/ requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b371aea54-d269c821 cn2=50697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.42.210.45 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "201.42.210.45",
"serverIP": "162.227.196.234",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:09:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.227.196.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=201.42.210.45 spt=50697 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:52 rt=1697436592724 request=/assets/ requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371aea54-d269c821 cn2=50697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.42.210.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:09:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.227.196.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=201.42.210.45 spt=50697 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:52 rt=1697436592724 request=/assets/ requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371aea54-d269c821 cn2=50697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.42.210.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 50697
facilitycode: 23
facilitylabel: local7
fqdn: /assets/
localhostname: WAFirewall
localstarttime: 1697436592724
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 201.42.210.45
serverIP: 162.227.196.234
userName: - | Explain this syslog message |
<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=103.14.150.50 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser="-" src=148.229.209.229 spt=36269 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=148.229.209.229 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 36269,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/index.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1697436588448 ",
"message": "<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=103.14.150.50 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser=\"-\" src=148.229.209.229 spt=36269 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=148.229.209.229 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "MALFORMED_VERSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "119",
"streamName": "barracuda_waf",
"clientIP": "148.229.209.229",
"serverIP": "103.14.150.50",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=103.14.150.50 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser="-" src=148.229.209.229 spt=36269 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=148.229.209.229 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=103.14.150.50 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser="-" src=148.229.209.229 spt=36269 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=148.229.209.229 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 36269
facilitycode: 23
facilitylabel: local7
fqdn: /index.jsp
localhostname: WAFirewall
localstarttime: 1697436588448
messagetype: MALFORMED_VERSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 119
streamName: barracuda_waf
clientIP: 148.229.209.229
serverIP: 103.14.150.50
userName: - | Explain this syslog message |
<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.222.209.50 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=237.181.202.98 spt=42231 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.181.202.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 42231,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/index.py",
"localhostname": "WAFirewall",
"localstarttime": "1697436585953 ",
"message": "<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.222.209.50 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=237.181.202.98 spt=42231 requestMethod=POST app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.181.202.98 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "237.181.202.98",
"serverIP": "79.222.209.50",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.222.209.50 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=237.181.202.98 spt=42231 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.181.202.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.222.209.50 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=237.181.202.98 spt=42231 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.181.202.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 42231
facilitycode: 23
facilitylabel: local7
fqdn: /index.py
localhostname: WAFirewall
localstarttime: 1697436585953
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 237.181.202.98
serverIP: 79.222.209.50
userName: - | Explain this syslog message |
<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=119.145.50.125 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser="-" src=211.42.41.137 spt=35047 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.42.41.137 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 35047,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/index.htm",
"localhostname": "WAFirewall",
"localstarttime": "1697436573435 ",
"message": "<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=119.145.50.125 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser=\"-\" src=211.42.41.137 spt=35047 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.42.41.137 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "MALFORMED_VERSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_MALFORMED_VERSION",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"AttackGroup:Protocol Violations",
"FollowUpAction:NONE",
"MALFORMED_VERSION",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "119",
"streamName": "barracuda_waf",
"clientIP": "211.42.41.137",
"serverIP": "119.145.50.125",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=119.145.50.125 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser="-" src=211.42.41.137 spt=35047 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.42.41.137 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=119.145.50.125 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser="-" src=211.42.41.137 spt=35047 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.42.41.137 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35047
facilitycode: 23
facilitylabel: local7
fqdn: /index.htm
localhostname: WAFirewall
localstarttime: 1697436573435
messagetype: MALFORMED_VERSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 119
streamName: barracuda_waf
clientIP: 211.42.41.137
serverIP: 119.145.50.125
userName: - | Explain this syslog message |
<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.113.242.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.33.72.22 spt=39189 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.33.72.22 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 39189,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/index.asp",
"localhostname": "WAFirewall",
"localstarttime": "1697436565598 ",
"message": "<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.113.242.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=166.33.72.22 spt=39189 requestMethod=POST app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.33.72.22 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "166.33.72.22",
"serverIP": "254.113.242.121",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.113.242.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.33.72.22 spt=39189 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.33.72.22 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.113.242.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.33.72.22 spt=39189 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.33.72.22 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 39189
facilitycode: 23
facilitylabel: local7
fqdn: /index.asp
localhostname: WAFirewall
localstarttime: 1697436565598
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 166.33.72.22
serverIP: 254.113.242.121
userName: - | Explain this syslog message |
<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.127.243.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=49.71.231.169 spt=41583 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.71.231.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41583,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini",
"localhostname": "WAFirewall",
"localstarttime": "1697438023437 ",
"message": "<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.127.243.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=49.71.231.169 spt=41583 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.71.231.169 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "49.71.231.169",
"serverIP": "218.127.243.124",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.127.243.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=49.71.231.169 spt=41583 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.71.231.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.127.243.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=49.71.231.169 spt=41583 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.71.231.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41583
facilitycode: 23
facilitylabel: local7
fqdn: ///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini
localhostname: WAFirewall
localstarttime: 1697438023437
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 49.71.231.169
serverIP: 218.127.243.124
userName: - | Explain this syslog message |
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.6.218.6 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=72.255.188.199 spt=53905 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=72.255.188.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53905,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini",
"localhostname": "WAFirewall",
"localstarttime": "1697438014965 ",
"message": "<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.6.218.6 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=72.255.188.199 spt=53905 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=72.255.188.199 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "72.255.188.199",
"serverIP": "200.6.218.6",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.6.218.6 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=72.255.188.199 spt=53905 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=72.255.188.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.6.218.6 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=72.255.188.199 spt=53905 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=72.255.188.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53905
facilitycode: 23
facilitylabel: local7
fqdn: ///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini
localhostname: WAFirewall
localstarttime: 1697438014965
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 72.255.188.199
serverIP: 200.6.218.6
userName: - | Explain this syslog message |
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.0.51.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.138.89.186 spt=42649 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.138.89.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 42649,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00",
"localhostname": "WAFirewall",
"localstarttime": "1697438014553 ",
"message": "<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.0.51.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=216.138.89.186 spt=42649 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.138.89.186 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "216.138.89.186",
"serverIP": "227.0.51.121",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.0.51.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.138.89.186 spt=42649 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.138.89.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.0.51.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.138.89.186 spt=42649 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.138.89.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 42649
facilitycode: 23
facilitylabel: local7
fqdn: /..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00
localhostname: WAFirewall
localstarttime: 1697438014553
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 216.138.89.186
serverIP: 227.0.51.121
userName: - | Explain this syslog message |
<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.131.212.166 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=19.21.158.34 spt=55217 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=19.21.158.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55217,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00",
"localhostname": "WAFirewall",
"localstarttime": "1697438013311 ",
"message": "<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.131.212.166 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=19.21.158.34 spt=55217 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=19.21.158.34 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "19.21.158.34",
"serverIP": "232.131.212.166",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.131.212.166 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=19.21.158.34 spt=55217 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=19.21.158.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.131.212.166 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=19.21.158.34 spt=55217 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=19.21.158.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55217
facilitycode: 23
facilitylabel: local7
fqdn: /c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00
localhostname: WAFirewall
localstarttime: 1697438013311
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 19.21.158.34
serverIP: 232.131.212.166
userName: - | Explain this syslog message |
<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=186.91.146.120 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=74.38.160.91 spt=32795 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.38.160.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 32795,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00",
"localhostname": "WAFirewall",
"localstarttime": "1697438005851 ",
"message": "<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=186.91.146.120 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser=\"-\" src=74.38.160.91 spt=32795 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.38.160.91 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22",
"barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"barracuda_waf"
],
"vendorcode": "16",
"streamName": "barracuda_waf",
"clientIP": "74.38.160.91",
"serverIP": "186.91.146.120",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=186.91.146.120 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=74.38.160.91 spt=32795 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.38.160.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=186.91.146.120 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=74.38.160.91 spt=32795 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.38.160.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 32795
facilitycode: 23
facilitylabel: local7
fqdn: /c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00
localhostname: WAFirewall
localstarttime: 1697438005851
messagetype: DIRECTORY_TRAVERSAL_BEYOND_ROOT
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22', 'barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'barracuda_waf']
vendorcode: 16
streamName: barracuda_waf
clientIP: 74.38.160.91
serverIP: 186.91.146.120
userName: - | Explain this syslog message |
<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.206.91.108 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=163.234.130.148 spt=41583 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.234.130.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 41583,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini",
"localhostname": "WAFirewall",
"localstarttime": "1697438023437 ",
"message": "<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.206.91.108 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=163.234.130.148 spt=41583 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.234.130.148 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "163.234.130.148",
"serverIP": "98.206.91.108",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.206.91.108 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=163.234.130.148 spt=41583 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.234.130.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.206.91.108 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=163.234.130.148 spt=41583 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.234.130.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 41583
facilitycode: 23
facilitylabel: local7
fqdn: ///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini
localhostname: WAFirewall
localstarttime: 1697438023437
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 163.234.130.148
serverIP: 98.206.91.108
userName: - | Explain this syslog message |
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.4.242.85 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.139.194.171 spt=53905 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.139.194.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53905,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini",
"localhostname": "WAFirewall",
"localstarttime": "1697438014965 ",
"message": "<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.4.242.85 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=56.139.194.171 spt=53905 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.139.194.171 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "56.139.194.171",
"serverIP": "77.4.242.85",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.4.242.85 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.139.194.171 spt=53905 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.139.194.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.4.242.85 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.139.194.171 spt=53905 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.139.194.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53905
facilitycode: 23
facilitylabel: local7
fqdn: ///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini
localhostname: WAFirewall
localstarttime: 1697438014965
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 56.139.194.171
serverIP: 77.4.242.85
userName: - | Explain this syslog message |
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.100.101.8 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=168.65.232.18 spt=42649 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=168.65.232.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 42649,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00",
"localhostname": "WAFirewall",
"localstarttime": "1697438014553 ",
"message": "<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.100.101.8 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=168.65.232.18 spt=42649 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=168.65.232.18 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "168.65.232.18",
"serverIP": "73.100.101.8",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.100.101.8 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=168.65.232.18 spt=42649 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=168.65.232.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.100.101.8 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=168.65.232.18 spt=42649 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=168.65.232.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 42649
facilitycode: 23
facilitylabel: local7
fqdn: /..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00
localhostname: WAFirewall
localstarttime: 1697438014553
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 168.65.232.18
serverIP: 73.100.101.8
userName: - | Explain this syslog message |
<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.212.189.67 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.146.200.208 spt=55217 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.146.200.208 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55217,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00",
"localhostname": "WAFirewall",
"localstarttime": "1697438013311 ",
"message": "<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.212.189.67 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=169.146.200.208 spt=55217 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.146.200.208 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "169.146.200.208",
"serverIP": "77.212.189.67",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.212.189.67 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.146.200.208 spt=55217 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.146.200.208 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.212.189.67 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.146.200.208 spt=55217 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.146.200.208 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55217
facilitycode: 23
facilitylabel: local7
fqdn: /c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00
localhostname: WAFirewall
localstarttime: 1697438013311
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 169.146.200.208
serverIP: 77.212.189.67
userName: - | Explain this syslog message |
<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=213.242.208.136 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=186.199.65.158 spt=32795 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.199.65.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 32795,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00",
"localhostname": "WAFirewall",
"localstarttime": "1697438005851 ",
"message": "<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=213.242.208.136 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser=\"-\" src=186.199.65.158 spt=32795 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.199.65.158 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22",
"barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"barracuda_waf"
],
"vendorcode": "16",
"streamName": "barracuda_waf",
"clientIP": "186.199.65.158",
"serverIP": "213.242.208.136",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=213.242.208.136 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=186.199.65.158 spt=32795 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.199.65.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=213.242.208.136 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=186.199.65.158 spt=32795 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.199.65.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 32795
facilitycode: 23
facilitylabel: local7
fqdn: /c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00
localhostname: WAFirewall
localstarttime: 1697438005851
messagetype: DIRECTORY_TRAVERSAL_BEYOND_ROOT
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22', 'barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'barracuda_waf']
vendorcode: 16
streamName: barracuda_waf
clientIP: 186.199.65.158
serverIP: 213.242.208.136
userName: - | Explain this syslog message |
<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.134.101.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=8.168.31.111 spt=47163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.168.31.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 47163,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/database.sql",
"localhostname": "WAFirewall",
"localstarttime": "1697437603607 ",
"message": "<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.134.101.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=8.168.31.111 spt=47163 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.168.31.111 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "8.168.31.111",
"serverIP": "163.134.101.133",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.134.101.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=8.168.31.111 spt=47163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.168.31.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.134.101.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=8.168.31.111 spt=47163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.168.31.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47163
facilitycode: 23
facilitylabel: local7
fqdn: /database.sql
localhostname: WAFirewall
localstarttime: 1697437603607
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 8.168.31.111
serverIP: 163.134.101.133
userName: - | Explain this syslog message |
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=246.210.93.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=120.197.150.18 spt=45213 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.197.150.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45213,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/static//////....//....//....//....//....//....//winnt/win.ini",
"localhostname": "WAFirewall",
"localstarttime": "1697437600838 ",
"message": "<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=246.210.93.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=120.197.150.18 spt=45213 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.197.150.18 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "120.197.150.18",
"serverIP": "246.210.93.45",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=246.210.93.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=120.197.150.18 spt=45213 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.197.150.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=246.210.93.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=120.197.150.18 spt=45213 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.197.150.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45213
facilitycode: 23
facilitylabel: local7
fqdn: /static//////....//....//....//....//....//....//winnt/win.ini
localhostname: WAFirewall
localstarttime: 1697437600838
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 120.197.150.18
serverIP: 246.210.93.45
userName: - | Explain this syslog message |
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.122.143.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.169.63.46 spt=56029 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600426 request=///////....//....//....//....//....//....//winnt/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4aa9-716aa1ef cn2=56029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.169.63.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 56029,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "///////....//....//....//....//....//....//winnt/win.ini%00",
"localhostname": "WAFirewall",
"localstarttime": "1697437600426 ",
"message": "<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.122.143.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=118.169.63.46 spt=56029 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:40 rt=1697437600426 request=///////....//....//....//....//....//....//winnt/win.ini%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a4aa9-716aa1ef cn2=56029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.169.63.46 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "118.169.63.46",
"serverIP": "100.122.143.133",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.122.143.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.169.63.46 spt=56029 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600426 request=///////....//....//....//....//....//....//winnt/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4aa9-716aa1ef cn2=56029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.169.63.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.122.143.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.169.63.46 spt=56029 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600426 request=///////....//....//....//....//....//....//winnt/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4aa9-716aa1ef cn2=56029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.169.63.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 56029
facilitycode: 23
facilitylabel: local7
fqdn: ///////....//....//....//....//....//....//winnt/win.ini%00
localhostname: WAFirewall
localstarttime: 1697437600426
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 118.169.63.46
serverIP: 100.122.143.133
userName: - | Explain this syslog message |
<185>Oct 16 01:26:39 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=86.181.19.164 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=186.70.192.143 spt=47053 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:39 rt=1697437599882 request=/databases.yml requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4889-6f6390b3 cn2=47053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.70.192.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 47053,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/databases.yml",
"localhostname": "WAFirewall",
"localstarttime": "1697437599882 ",
"message": "<185>Oct 16 01:26:39 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=86.181.19.164 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=186.70.192.143 spt=47053 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:39 rt=1697437599882 request=/databases.yml requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a4889-6f6390b3 cn2=47053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.70.192.143 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "186.70.192.143",
"serverIP": "86.181.19.164",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:39 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=86.181.19.164 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=186.70.192.143 spt=47053 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:39 rt=1697437599882 request=/databases.yml requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4889-6f6390b3 cn2=47053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.70.192.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:39 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=86.181.19.164 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=186.70.192.143 spt=47053 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:39 rt=1697437599882 request=/databases.yml requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4889-6f6390b3 cn2=47053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.70.192.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47053
facilitycode: 23
facilitylabel: local7
fqdn: /databases.yml
localhostname: WAFirewall
localstarttime: 1697437599882
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 186.70.192.143
serverIP: 86.181.19.164
userName: - | Explain this syslog message |
<185>Oct 16 01:26:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.76.202.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=165.103.228.227 spt=54485 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:38 rt=1697437598642 request=/.htuser requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a43b1-6d6381b5 cn2=54485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=165.103.228.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54485,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/.htuser",
"localhostname": "WAFirewall",
"localstarttime": "1697437598642 ",
"message": "<185>Oct 16 01:26:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.76.202.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=165.103.228.227 spt=54485 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:38 rt=1697437598642 request=/.htuser requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a43b1-6d6381b5 cn2=54485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=165.103.228.227 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "165.103.228.227",
"serverIP": "163.76.202.151",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.76.202.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=165.103.228.227 spt=54485 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:38 rt=1697437598642 request=/.htuser requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a43b1-6d6381b5 cn2=54485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=165.103.228.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.76.202.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=165.103.228.227 spt=54485 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:38 rt=1697437598642 request=/.htuser requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a43b1-6d6381b5 cn2=54485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=165.103.228.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54485
facilitycode: 23
facilitylabel: local7
fqdn: /.htuser
localhostname: WAFirewall
localstarttime: 1697437598642
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 165.103.228.227
serverIP: 163.76.202.151
userName: - | Explain this syslog message |
<185>Oct 16 01:26:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.46.251.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=25.15.247.178 spt=45663 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:37 rt=1697437597172 request=/comersus/store/comersus_message.asp requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a3df4-126a9df1 cn2=45663 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.15.247.178 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45663,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comersus/store/comersus_message.asp",
"localhostname": "WAFirewall",
"localstarttime": "1697437597172 ",
"message": "<185>Oct 16 01:26:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.46.251.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=25.15.247.178 spt=45663 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:37 rt=1697437597172 request=/comersus/store/comersus_message.asp requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a3df4-126a9df1 cn2=45663 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.15.247.178 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "25.15.247.178",
"serverIP": "98.46.251.110",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.46.251.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=25.15.247.178 spt=45663 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:37 rt=1697437597172 request=/comersus/store/comersus_message.asp requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a3df4-126a9df1 cn2=45663 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.15.247.178 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.46.251.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=25.15.247.178 spt=45663 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:37 rt=1697437597172 request=/comersus/store/comersus_message.asp requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a3df4-126a9df1 cn2=45663 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.15.247.178 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45663
facilitycode: 23
facilitylabel: local7
fqdn: /comersus/store/comersus_message.asp
localhostname: WAFirewall
localstarttime: 1697437597172
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 25.15.247.178
serverIP: 98.46.251.110
userName: - | Explain this syslog message |
<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.249.233.78 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.9.94.235 spt=57831 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:34 rt=1697437594693 request=/helpdezk/admin/login requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a3445-6a6965e7 cn2=57831 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.9.94.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 57831,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/helpdezk/admin/login",
"localhostname": "WAFirewall",
"localstarttime": "1697437594693 ",
"message": "<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.249.233.78 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=233.9.94.235 spt=57831 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:34 rt=1697437594693 request=/helpdezk/admin/login requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a3445-6a6965e7 cn2=57831 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.9.94.235 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "233.9.94.235",
"serverIP": "73.249.233.78",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.249.233.78 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.9.94.235 spt=57831 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:34 rt=1697437594693 request=/helpdezk/admin/login requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a3445-6a6965e7 cn2=57831 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.9.94.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.249.233.78 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.9.94.235 spt=57831 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:34 rt=1697437594693 request=/helpdezk/admin/login requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a3445-6a6965e7 cn2=57831 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.9.94.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 57831
facilitycode: 23
facilitylabel: local7
fqdn: /helpdezk/admin/login
localhostname: WAFirewall
localstarttime: 1697437594693
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 233.9.94.235
serverIP: 73.249.233.78
userName: - | Explain this syslog message |
<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.227.141.83 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=242.139.197.114 spt=33907 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:34 rt=1697437594124 request=/static//////....//....//....//....//....//....//boot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a320c-d6d770e cn2=33907 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.139.197.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 33907,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/static//////....//....//....//....//....//....//boot.ini%00",
"localhostname": "WAFirewall",
"localstarttime": "1697437594124 ",
"message": "<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.227.141.83 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=242.139.197.114 spt=33907 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:34 rt=1697437594124 request=/static//////....//....//....//....//....//....//boot.ini%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a320c-d6d770e cn2=33907 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.139.197.114 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "242.139.197.114",
"serverIP": "183.227.141.83",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.227.141.83 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=242.139.197.114 spt=33907 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:34 rt=1697437594124 request=/static//////....//....//....//....//....//....//boot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a320c-d6d770e cn2=33907 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.139.197.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.227.141.83 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=242.139.197.114 spt=33907 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:34 rt=1697437594124 request=/static//////....//....//....//....//....//....//boot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a320c-d6d770e cn2=33907 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.139.197.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 33907
facilitycode: 23
facilitylabel: local7
fqdn: /static//////....//....//....//....//....//....//boot.ini%00
localhostname: WAFirewall
localstarttime: 1697437594124
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 242.139.197.114
serverIP: 183.227.141.83
userName: - | Explain this syslog message |
<185>Oct 16 01:26:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.33.90.16 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=164.120.25.158 spt=33203 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:33 rt=1697437593393 request=/wiki/wiki.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a2f31-49969c10 cn2=33203 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=164.120.25.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 33203,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/wiki/wiki.cgi",
"localhostname": "WAFirewall",
"localstarttime": "1697437593393 ",
"message": "<185>Oct 16 01:26:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.33.90.16 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=164.120.25.158 spt=33203 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:33 rt=1697437593393 request=/wiki/wiki.cgi requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a2f31-49969c10 cn2=33203 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=164.120.25.158 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "164.120.25.158",
"serverIP": "119.33.90.16",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.33.90.16 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=164.120.25.158 spt=33203 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:33 rt=1697437593393 request=/wiki/wiki.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a2f31-49969c10 cn2=33203 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=164.120.25.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.33.90.16 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=164.120.25.158 spt=33203 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:33 rt=1697437593393 request=/wiki/wiki.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a2f31-49969c10 cn2=33203 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=164.120.25.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 33203
facilitycode: 23
facilitylabel: local7
fqdn: /wiki/wiki.cgi
localhostname: WAFirewall
localstarttime: 1697437593393
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 164.120.25.158
serverIP: 119.33.90.16
userName: - | Explain this syslog message |
<185>Oct 16 01:26:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.104.196.48 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=12.91.229.193 spt=36745 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:32 rt=1697437592981 request=/prowiki/wiki.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a2d95-439262f0 cn2=36745 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.91.229.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 36745,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/prowiki/wiki.cgi",
"localhostname": "WAFirewall",
"localstarttime": "1697437592981 ",
"message": "<185>Oct 16 01:26:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.104.196.48 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=12.91.229.193 spt=36745 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:32 rt=1697437592981 request=/prowiki/wiki.cgi requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a2d95-439262f0 cn2=36745 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.91.229.193 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "12.91.229.193",
"serverIP": "156.104.196.48",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.104.196.48 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=12.91.229.193 spt=36745 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:32 rt=1697437592981 request=/prowiki/wiki.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a2d95-439262f0 cn2=36745 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.91.229.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.104.196.48 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=12.91.229.193 spt=36745 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:32 rt=1697437592981 request=/prowiki/wiki.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a2d95-439262f0 cn2=36745 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.91.229.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 36745
facilitycode: 23
facilitylabel: local7
fqdn: /prowiki/wiki.cgi
localhostname: WAFirewall
localstarttime: 1697437592981
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 12.91.229.193
serverIP: 156.104.196.48
userName: - | Explain this syslog message |
<185>Oct 16 01:26:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.177.8.200 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=75.81.235.236 spt=47523 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:29 rt=1697437589224 request=/id_dss requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a1ee8-498e9bcc cn2=47523 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=75.81.235.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 47523,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/id_dss",
"localhostname": "WAFirewall",
"localstarttime": "1697437589224 ",
"message": "<185>Oct 16 01:26:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.177.8.200 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=75.81.235.236 spt=47523 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:29 rt=1697437589224 request=/id_dss requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a1ee8-498e9bcc cn2=47523 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=75.81.235.236 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "75.81.235.236",
"serverIP": "104.177.8.200",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.177.8.200 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=75.81.235.236 spt=47523 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:29 rt=1697437589224 request=/id_dss requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a1ee8-498e9bcc cn2=47523 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=75.81.235.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.177.8.200 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=75.81.235.236 spt=47523 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:29 rt=1697437589224 request=/id_dss requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a1ee8-498e9bcc cn2=47523 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=75.81.235.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47523
facilitycode: 23
facilitylabel: local7
fqdn: /id_dss
localhostname: WAFirewall
localstarttime: 1697437589224
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 75.81.235.236
serverIP: 104.177.8.200
userName: - | Explain this syslog message |
<185>Oct 16 01:26:23 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.205.62.222 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.53.205.193 spt=35683 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:23 rt=1697437583919 request=///////....//....//....//....//....//....//windows/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a0a2f-d6a75f2 cn2=35683 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.53.205.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 35683,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "///////....//....//....//....//....//....//windows/win.ini",
"localhostname": "WAFirewall",
"localstarttime": "1697437583919 ",
"message": "<185>Oct 16 01:26:23 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.205.62.222 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=65.53.205.193 spt=35683 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:23 rt=1697437583919 request=///////....//....//....//....//....//....//windows/win.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a0a2f-d6a75f2 cn2=35683 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.53.205.193 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "65.53.205.193",
"serverIP": "205.205.62.222",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:23 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.205.62.222 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.53.205.193 spt=35683 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:23 rt=1697437583919 request=///////....//....//....//....//....//....//windows/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a0a2f-d6a75f2 cn2=35683 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.53.205.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:23 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.205.62.222 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.53.205.193 spt=35683 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:23 rt=1697437583919 request=///////....//....//....//....//....//....//windows/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a0a2f-d6a75f2 cn2=35683 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.53.205.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35683
facilitycode: 23
facilitylabel: local7
fqdn: ///////....//....//....//....//....//....//windows/win.ini
localhostname: WAFirewall
localstarttime: 1697437583919
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 65.53.205.193
serverIP: 205.205.62.222
userName: - | Explain this syslog message |
<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.27.65.206 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.243.109.82 spt=47163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.243.109.82 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 47163,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/database.sql",
"localhostname": "WAFirewall",
"localstarttime": "1697437603607 ",
"message": "<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.27.65.206 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=180.243.109.82 spt=47163 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.243.109.82 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "180.243.109.82",
"serverIP": "34.27.65.206",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.27.65.206 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.243.109.82 spt=47163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.243.109.82 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.27.65.206 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.243.109.82 spt=47163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.243.109.82 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 47163
facilitycode: 23
facilitylabel: local7
fqdn: /database.sql
localhostname: WAFirewall
localstarttime: 1697437603607
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 180.243.109.82
serverIP: 34.27.65.206
userName: - | Explain this syslog message |
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.88.69.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.255.242.138 spt=45213 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.255.242.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 45213,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/static//////....//....//....//....//....//....//winnt/win.ini",
"localhostname": "WAFirewall",
"localstarttime": "1697437600838 ",
"message": "<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.88.69.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=56.255.242.138 spt=45213 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.255.242.138 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "56.255.242.138",
"serverIP": "62.88.69.49",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.88.69.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.255.242.138 spt=45213 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.255.242.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.88.69.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.255.242.138 spt=45213 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.255.242.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 45213
facilitycode: 23
facilitylabel: local7
fqdn: /static//////....//....//....//....//....//....//winnt/win.ini
localhostname: WAFirewall
localstarttime: 1697437600838
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 56.255.242.138
serverIP: 62.88.69.49
userName: - | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.