input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<185>Oct 16 01:09:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=175.218.89.249 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=30.117.219.52 spt=50697 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:52 rt=1697436592724 request=/assets/ requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371aea54-d269c821 cn2=50697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=30.117.219.52 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 50697 facilitycode: 23 facilitylabel: local7 fqdn: /assets/ localhostname: WAFirewall localstarttime: 1697436592724 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 30.117.219.52 serverIP: 175.218.89.249 userName: -
Explain this syslog message
<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=197.140.186.108 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser="-" src=195.197.37.231 spt=36269 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.197.37.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 36269, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/index.jsp", "localhostname": "WAFirewall", "localstarttime": "1697436588448 ", "message": "<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=197.140.186.108 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser=\"-\" src=195.197.37.231 spt=36269 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.197.37.231 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "MALFORMED_VERSION", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "119", "streamName": "barracuda_waf", "clientIP": "195.197.37.231", "serverIP": "197.140.186.108", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=197.140.186.108 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser="-" src=195.197.37.231 spt=36269 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.197.37.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=197.140.186.108 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser="-" src=195.197.37.231 spt=36269 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=195.197.37.231 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 36269 facilitycode: 23 facilitylabel: local7 fqdn: /index.jsp localhostname: WAFirewall localstarttime: 1697436588448 messagetype: MALFORMED_VERSION priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 119 streamName: barracuda_waf clientIP: 195.197.37.231 serverIP: 197.140.186.108 userName: -
Explain this syslog message
<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.146.239.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.113.109.109 spt=42231 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.113.109.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 42231, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/index.py", "localhostname": "WAFirewall", "localstarttime": "1697436585953 ", "message": "<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.146.239.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=154.113.109.109 spt=42231 requestMethod=POST app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.113.109.109 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "154.113.109.109", "serverIP": "98.146.239.110", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.146.239.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.113.109.109 spt=42231 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.113.109.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.146.239.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.113.109.109 spt=42231 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.113.109.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 42231 facilitycode: 23 facilitylabel: local7 fqdn: /index.py localhostname: WAFirewall localstarttime: 1697436585953 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 154.113.109.109 serverIP: 98.146.239.110 userName: -
Explain this syslog message
<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=37.62.1.57 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser="-" src=5.219.31.243 spt=35047 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=5.219.31.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35047, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/index.htm", "localhostname": "WAFirewall", "localstarttime": "1697436573435 ", "message": "<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=37.62.1.57 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser=\"-\" src=5.219.31.243 spt=35047 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=5.219.31.243 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "MALFORMED_VERSION", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "119", "streamName": "barracuda_waf", "clientIP": "5.219.31.243", "serverIP": "37.62.1.57", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=37.62.1.57 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser="-" src=5.219.31.243 spt=35047 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=5.219.31.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=37.62.1.57 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser="-" src=5.219.31.243 spt=35047 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=5.219.31.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35047 facilitycode: 23 facilitylabel: local7 fqdn: /index.htm localhostname: WAFirewall localstarttime: 1697436573435 messagetype: MALFORMED_VERSION priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 119 streamName: barracuda_waf clientIP: 5.219.31.243 serverIP: 37.62.1.57 userName: -
Explain this syslog message
<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.79.60.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=220.14.196.114 spt=39189 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.14.196.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 39189, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/index.asp", "localhostname": "WAFirewall", "localstarttime": "1697436565598 ", "message": "<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.79.60.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=220.14.196.114 spt=39189 requestMethod=POST app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.14.196.114 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "220.14.196.114", "serverIP": "68.79.60.34", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.79.60.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=220.14.196.114 spt=39189 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.14.196.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=68.79.60.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=220.14.196.114 spt=39189 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=220.14.196.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 39189 facilitycode: 23 facilitylabel: local7 fqdn: /index.asp localhostname: WAFirewall localstarttime: 1697436565598 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 220.14.196.114 serverIP: 68.79.60.34 userName: -
Explain this syslog message
<185>Oct 16 01:09:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.227.196.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=201.42.210.45 spt=50697 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:52 rt=1697436592724 request=/assets/ requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371aea54-d269c821 cn2=50697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.42.210.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 50697, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/assets/", "localhostname": "WAFirewall", "localstarttime": "1697436592724 ", "message": "<185>Oct 16 01:09:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.227.196.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=201.42.210.45 spt=50697 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:52 rt=1697436592724 request=/assets/ requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b371aea54-d269c821 cn2=50697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.42.210.45 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "201.42.210.45", "serverIP": "162.227.196.234", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:09:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.227.196.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=201.42.210.45 spt=50697 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:52 rt=1697436592724 request=/assets/ requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371aea54-d269c821 cn2=50697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.42.210.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:09:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=162.227.196.234 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=201.42.210.45 spt=50697 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:52 rt=1697436592724 request=/assets/ requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b371aea54-d269c821 cn2=50697 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=201.42.210.45 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 50697 facilitycode: 23 facilitylabel: local7 fqdn: /assets/ localhostname: WAFirewall localstarttime: 1697436592724 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 201.42.210.45 serverIP: 162.227.196.234 userName: -
Explain this syslog message
<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=103.14.150.50 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser="-" src=148.229.209.229 spt=36269 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=148.229.209.229 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 36269, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/index.jsp", "localhostname": "WAFirewall", "localstarttime": "1697436588448 ", "message": "<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=103.14.150.50 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser=\"-\" src=148.229.209.229 spt=36269 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=148.229.209.229 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "MALFORMED_VERSION", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "119", "streamName": "barracuda_waf", "clientIP": "148.229.209.229", "serverIP": "103.14.150.50", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=103.14.150.50 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser="-" src=148.229.209.229 spt=36269 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=148.229.209.229 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:09:48 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=103.14.150.50 dpt=80 act=DENY msg=[GET /index.jsp HTTP/0.9] duser="-" src=148.229.209.229 spt=36269 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:48 rt=1697436588448 request=/index.jsp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371ad9a0-12688ef6 cn2=36269 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=148.229.209.229 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 36269 facilitycode: 23 facilitylabel: local7 fqdn: /index.jsp localhostname: WAFirewall localstarttime: 1697436588448 messagetype: MALFORMED_VERSION priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 119 streamName: barracuda_waf clientIP: 148.229.209.229 serverIP: 103.14.150.50 userName: -
Explain this syslog message
<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.222.209.50 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=237.181.202.98 spt=42231 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.181.202.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 42231, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/index.py", "localhostname": "WAFirewall", "localstarttime": "1697436585953 ", "message": "<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.222.209.50 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=237.181.202.98 spt=42231 requestMethod=POST app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.181.202.98 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "237.181.202.98", "serverIP": "79.222.209.50", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.222.209.50 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=237.181.202.98 spt=42231 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.181.202.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:09:45 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.222.209.50 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=237.181.202.98 spt=42231 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:45 rt=1697436585953 request=/index.py requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371acfe1-106e8225 cn2=42231 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.181.202.98 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 42231 facilitycode: 23 facilitylabel: local7 fqdn: /index.py localhostname: WAFirewall localstarttime: 1697436585953 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 237.181.202.98 serverIP: 79.222.209.50 userName: -
Explain this syslog message
<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=119.145.50.125 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser="-" src=211.42.41.137 spt=35047 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.42.41.137 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35047, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/index.htm", "localhostname": "WAFirewall", "localstarttime": "1697436573435 ", "message": "<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=119.145.50.125 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser=\"-\" src=211.42.41.137 spt=35047 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.42.41.137 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "MALFORMED_VERSION", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_MALFORMED_VERSION", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "AttackGroup:Protocol Violations", "FollowUpAction:NONE", "MALFORMED_VERSION", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "119", "streamName": "barracuda_waf", "clientIP": "211.42.41.137", "serverIP": "119.145.50.125", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=119.145.50.125 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser="-" src=211.42.41.137 spt=35047 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.42.41.137 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:09:33 WAFirewall CEF:0|Barracuda|WAF|1210|119|MALFORMED_VERSION|1|cat=WF dst=119.145.50.125 dpt=80 act=DENY msg=[GET /index.htm HTTP/0.9] duser="-" src=211.42.41.137 spt=35047 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:09:33 rt=1697436573435 request=/index.htm requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a9efb-129cc042 cn2=35047 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=211.42.41.137 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35047 facilitycode: 23 facilitylabel: local7 fqdn: /index.htm localhostname: WAFirewall localstarttime: 1697436573435 messagetype: MALFORMED_VERSION priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_MALFORMED_VERSION', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'AttackGroup:Protocol Violations', 'FollowUpAction:NONE', 'MALFORMED_VERSION', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 119 streamName: barracuda_waf clientIP: 211.42.41.137 serverIP: 119.145.50.125 userName: -
Explain this syslog message
<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.113.242.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.33.72.22 spt=39189 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.33.72.22 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 39189, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/index.asp", "localhostname": "WAFirewall", "localstarttime": "1697436565598 ", "message": "<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.113.242.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=166.33.72.22 spt=39189 requestMethod=POST app=HTTP requestContext=\"-\" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.33.72.22 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "166.33.72.22", "serverIP": "254.113.242.121", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.113.242.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.33.72.22 spt=39189 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.33.72.22 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:09:25 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=254.113.242.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=166.33.72.22 spt=39189 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:09:25 rt=1697436565598 request=/index.asp requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b371a805e-df9a6951 cn2=39189 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=166.33.72.22 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 39189 facilitycode: 23 facilitylabel: local7 fqdn: /index.asp localhostname: WAFirewall localstarttime: 1697436565598 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 166.33.72.22 serverIP: 254.113.242.121 userName: -
Explain this syslog message
<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.127.243.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=49.71.231.169 spt=41583 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.71.231.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 41583, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini", "localhostname": "WAFirewall", "localstarttime": "1697438023437 ", "message": "<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.127.243.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=49.71.231.169 spt=41583 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.71.231.169 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "49.71.231.169", "serverIP": "218.127.243.124", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.127.243.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=49.71.231.169 spt=41583 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.71.231.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=218.127.243.124 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=49.71.231.169 spt=41583 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=49.71.231.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 41583 facilitycode: 23 facilitylabel: local7 fqdn: ///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini localhostname: WAFirewall localstarttime: 1697438023437 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 49.71.231.169 serverIP: 218.127.243.124 userName: -
Explain this syslog message
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.6.218.6 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=72.255.188.199 spt=53905 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=72.255.188.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53905, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini", "localhostname": "WAFirewall", "localstarttime": "1697438014965 ", "message": "<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.6.218.6 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=72.255.188.199 spt=53905 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=72.255.188.199 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "72.255.188.199", "serverIP": "200.6.218.6", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.6.218.6 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=72.255.188.199 spt=53905 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=72.255.188.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=200.6.218.6 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=72.255.188.199 spt=53905 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=72.255.188.199 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53905 facilitycode: 23 facilitylabel: local7 fqdn: ///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini localhostname: WAFirewall localstarttime: 1697438014965 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 72.255.188.199 serverIP: 200.6.218.6 userName: -
Explain this syslog message
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.0.51.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.138.89.186 spt=42649 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.138.89.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 42649, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00", "localhostname": "WAFirewall", "localstarttime": "1697438014553 ", "message": "<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.0.51.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=216.138.89.186 spt=42649 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.138.89.186 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "216.138.89.186", "serverIP": "227.0.51.121", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.0.51.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.138.89.186 spt=42649 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.138.89.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=227.0.51.121 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=216.138.89.186 spt=42649 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=216.138.89.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 42649 facilitycode: 23 facilitylabel: local7 fqdn: /..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 localhostname: WAFirewall localstarttime: 1697438014553 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 216.138.89.186 serverIP: 227.0.51.121 userName: -
Explain this syslog message
<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.131.212.166 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=19.21.158.34 spt=55217 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=19.21.158.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 55217, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00", "localhostname": "WAFirewall", "localstarttime": "1697438013311 ", "message": "<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.131.212.166 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=19.21.158.34 spt=55217 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=19.21.158.34 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "19.21.158.34", "serverIP": "232.131.212.166", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.131.212.166 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=19.21.158.34 spt=55217 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=19.21.158.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=232.131.212.166 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=19.21.158.34 spt=55217 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=19.21.158.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 55217 facilitycode: 23 facilitylabel: local7 fqdn: /c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 localhostname: WAFirewall localstarttime: 1697438013311 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 19.21.158.34 serverIP: 232.131.212.166 userName: -
Explain this syslog message
<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=186.91.146.120 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=74.38.160.91 spt=32795 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.38.160.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 32795, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00", "localhostname": "WAFirewall", "localstarttime": "1697438005851 ", "message": "<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=186.91.146.120 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser=\"-\" src=74.38.160.91 spt=32795 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.38.160.91 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "DIRECTORY_TRAVERSAL_BEYOND_ROOT", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "DIRECTORY_TRAVERSAL_BEYOND_ROOT", "RuleType:GLOBAL", "ProxyIP:143.244.39.22", "barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT", "barracuda_waf" ], "vendorcode": "16", "streamName": "barracuda_waf", "clientIP": "74.38.160.91", "serverIP": "186.91.146.120", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=186.91.146.120 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=74.38.160.91 spt=32795 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.38.160.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=186.91.146.120 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=74.38.160.91 spt=32795 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=74.38.160.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 32795 facilitycode: 23 facilitylabel: local7 fqdn: /c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 localhostname: WAFirewall localstarttime: 1697438005851 messagetype: DIRECTORY_TRAVERSAL_BEYOND_ROOT priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22', 'barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'barracuda_waf'] vendorcode: 16 streamName: barracuda_waf clientIP: 74.38.160.91 serverIP: 186.91.146.120 userName: -
Explain this syslog message
<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.206.91.108 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=163.234.130.148 spt=41583 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.234.130.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 41583, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini", "localhostname": "WAFirewall", "localstarttime": "1697438023437 ", "message": "<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.206.91.108 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=163.234.130.148 spt=41583 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.234.130.148 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "163.234.130.148", "serverIP": "98.206.91.108", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.206.91.108 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=163.234.130.148 spt=41583 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.234.130.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:33:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.206.91.108 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=163.234.130.148 spt=41583 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:43 rt=1697438023437 request=///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730bf0d-706a91f1 cn2=41583 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=163.234.130.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 41583 facilitycode: 23 facilitylabel: local7 fqdn: ///////..%255f..%255f..%255f..%255f..%255f..%255fwinnt/win.ini localhostname: WAFirewall localstarttime: 1697438023437 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 163.234.130.148 serverIP: 98.206.91.108 userName: -
Explain this syslog message
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.4.242.85 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.139.194.171 spt=53905 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.139.194.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 53905, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini", "localhostname": "WAFirewall", "localstarttime": "1697438014965 ", "message": "<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.4.242.85 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=56.139.194.171 spt=53905 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.139.194.171 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "56.139.194.171", "serverIP": "77.4.242.85", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.4.242.85 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.139.194.171 spt=53905 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.139.194.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.4.242.85 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.139.194.171 spt=53905 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014965 request=///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309df5-a675edc cn2=53905 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.139.194.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 53905 facilitycode: 23 facilitylabel: local7 fqdn: ///////..%255f..%255f..%255f..%255f..%255f..%255fboot.ini localhostname: WAFirewall localstarttime: 1697438014965 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 56.139.194.171 serverIP: 77.4.242.85 userName: -
Explain this syslog message
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.100.101.8 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=168.65.232.18 spt=42649 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=168.65.232.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 42649, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00", "localhostname": "WAFirewall", "localstarttime": "1697438014553 ", "message": "<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.100.101.8 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=168.65.232.18 spt=42649 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=168.65.232.18 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "168.65.232.18", "serverIP": "73.100.101.8", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.100.101.8 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=168.65.232.18 spt=42649 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=168.65.232.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:33:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.100.101.8 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=168.65.232.18 spt=42649 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:34 rt=1697438014553 request=/..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37309c59-e697eee cn2=42649 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=168.65.232.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 42649 facilitycode: 23 facilitylabel: local7 fqdn: /..%255f..%255f..%255f..%255f..%255f..%255fboot.ini%00 localhostname: WAFirewall localstarttime: 1697438014553 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 168.65.232.18 serverIP: 73.100.101.8 userName: -
Explain this syslog message
<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.212.189.67 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.146.200.208 spt=55217 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.146.200.208 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 55217, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00", "localhostname": "WAFirewall", "localstarttime": "1697438013311 ", "message": "<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.212.189.67 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=169.146.200.208 spt=55217 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.146.200.208 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "169.146.200.208", "serverIP": "77.212.189.67", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.212.189.67 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.146.200.208 spt=55217 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.146.200.208 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:33:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.212.189.67 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.146.200.208 spt=55217 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:33 rt=1697438013311 request=/c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3730977f-71629dae cn2=55217 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.146.200.208 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 55217 facilitycode: 23 facilitylabel: local7 fqdn: /c:..%255f..%255f..%255f..%255f..%255f..%255fwindows/win.ini%00 localhostname: WAFirewall localstarttime: 1697438013311 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 169.146.200.208 serverIP: 77.212.189.67 userName: -
Explain this syslog message
<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=213.242.208.136 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=186.199.65.158 spt=32795 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.199.65.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 32795, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00", "localhostname": "WAFirewall", "localstarttime": "1697438005851 ", "message": "<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=213.242.208.136 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser=\"-\" src=186.199.65.158 spt=32795 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.199.65.158 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "DIRECTORY_TRAVERSAL_BEYOND_ROOT", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "AttackGroup:Forceful Browsing", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "DIRECTORY_TRAVERSAL_BEYOND_ROOT", "RuleType:GLOBAL", "ProxyIP:143.244.39.22", "barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT", "barracuda_waf" ], "vendorcode": "16", "streamName": "barracuda_waf", "clientIP": "186.199.65.158", "serverIP": "213.242.208.136", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=213.242.208.136 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=186.199.65.158 spt=32795 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.199.65.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:33:25 WAFirewall CEF:0|Barracuda|WAF|1210|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=213.242.208.136 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=186.199.65.158 spt=32795 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:33:25 rt=1697438005851 request=/c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37307a5b-3b5c3394 cn2=32795 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.199.65.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 32795 facilitycode: 23 facilitylabel: local7 fqdn: /c:..%u002f..%u002f..%u002f..%u002f..%u002f..%u002fetc/passwd%00 localhostname: WAFirewall localstarttime: 1697438005851 messagetype: DIRECTORY_TRAVERSAL_BEYOND_ROOT priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22', 'barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'barracuda_waf'] vendorcode: 16 streamName: barracuda_waf clientIP: 186.199.65.158 serverIP: 213.242.208.136 userName: -
Explain this syslog message
<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.134.101.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=8.168.31.111 spt=47163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.168.31.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 47163, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/database.sql", "localhostname": "WAFirewall", "localstarttime": "1697437603607 ", "message": "<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.134.101.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=8.168.31.111 spt=47163 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.168.31.111 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "8.168.31.111", "serverIP": "163.134.101.133", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.134.101.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=8.168.31.111 spt=47163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.168.31.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.134.101.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=8.168.31.111 spt=47163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=8.168.31.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 47163 facilitycode: 23 facilitylabel: local7 fqdn: /database.sql localhostname: WAFirewall localstarttime: 1697437603607 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 8.168.31.111 serverIP: 163.134.101.133 userName: -
Explain this syslog message
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=246.210.93.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=120.197.150.18 spt=45213 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.197.150.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45213, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/static//////....//....//....//....//....//....//winnt/win.ini", "localhostname": "WAFirewall", "localstarttime": "1697437600838 ", "message": "<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=246.210.93.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=120.197.150.18 spt=45213 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.197.150.18 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "120.197.150.18", "serverIP": "246.210.93.45", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=246.210.93.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=120.197.150.18 spt=45213 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.197.150.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=246.210.93.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=120.197.150.18 spt=45213 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=120.197.150.18 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45213 facilitycode: 23 facilitylabel: local7 fqdn: /static//////....//....//....//....//....//....//winnt/win.ini localhostname: WAFirewall localstarttime: 1697437600838 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 120.197.150.18 serverIP: 246.210.93.45 userName: -
Explain this syslog message
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.122.143.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.169.63.46 spt=56029 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600426 request=///////....//....//....//....//....//....//winnt/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4aa9-716aa1ef cn2=56029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.169.63.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 56029, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "///////....//....//....//....//....//....//winnt/win.ini%00", "localhostname": "WAFirewall", "localstarttime": "1697437600426 ", "message": "<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.122.143.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=118.169.63.46 spt=56029 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:40 rt=1697437600426 request=///////....//....//....//....//....//....//winnt/win.ini%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a4aa9-716aa1ef cn2=56029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.169.63.46 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "118.169.63.46", "serverIP": "100.122.143.133", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.122.143.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.169.63.46 spt=56029 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600426 request=///////....//....//....//....//....//....//winnt/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4aa9-716aa1ef cn2=56029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.169.63.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=100.122.143.133 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=118.169.63.46 spt=56029 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600426 request=///////....//....//....//....//....//....//winnt/win.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4aa9-716aa1ef cn2=56029 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=118.169.63.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 56029 facilitycode: 23 facilitylabel: local7 fqdn: ///////....//....//....//....//....//....//winnt/win.ini%00 localhostname: WAFirewall localstarttime: 1697437600426 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 118.169.63.46 serverIP: 100.122.143.133 userName: -
Explain this syslog message
<185>Oct 16 01:26:39 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=86.181.19.164 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=186.70.192.143 spt=47053 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:39 rt=1697437599882 request=/databases.yml requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4889-6f6390b3 cn2=47053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.70.192.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 47053, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/databases.yml", "localhostname": "WAFirewall", "localstarttime": "1697437599882 ", "message": "<185>Oct 16 01:26:39 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=86.181.19.164 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=186.70.192.143 spt=47053 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:39 rt=1697437599882 request=/databases.yml requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a4889-6f6390b3 cn2=47053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.70.192.143 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "186.70.192.143", "serverIP": "86.181.19.164", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:39 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=86.181.19.164 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=186.70.192.143 spt=47053 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:39 rt=1697437599882 request=/databases.yml requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4889-6f6390b3 cn2=47053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.70.192.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:39 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=86.181.19.164 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=186.70.192.143 spt=47053 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:39 rt=1697437599882 request=/databases.yml requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4889-6f6390b3 cn2=47053 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=186.70.192.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 47053 facilitycode: 23 facilitylabel: local7 fqdn: /databases.yml localhostname: WAFirewall localstarttime: 1697437599882 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 186.70.192.143 serverIP: 86.181.19.164 userName: -
Explain this syslog message
<185>Oct 16 01:26:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.76.202.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=165.103.228.227 spt=54485 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:38 rt=1697437598642 request=/.htuser requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a43b1-6d6381b5 cn2=54485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=165.103.228.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 54485, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/.htuser", "localhostname": "WAFirewall", "localstarttime": "1697437598642 ", "message": "<185>Oct 16 01:26:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.76.202.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=165.103.228.227 spt=54485 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:38 rt=1697437598642 request=/.htuser requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a43b1-6d6381b5 cn2=54485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=165.103.228.227 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "165.103.228.227", "serverIP": "163.76.202.151", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.76.202.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=165.103.228.227 spt=54485 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:38 rt=1697437598642 request=/.htuser requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a43b1-6d6381b5 cn2=54485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=165.103.228.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:38 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=163.76.202.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=165.103.228.227 spt=54485 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:38 rt=1697437598642 request=/.htuser requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a43b1-6d6381b5 cn2=54485 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=165.103.228.227 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 54485 facilitycode: 23 facilitylabel: local7 fqdn: /.htuser localhostname: WAFirewall localstarttime: 1697437598642 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 165.103.228.227 serverIP: 163.76.202.151 userName: -
Explain this syslog message
<185>Oct 16 01:26:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.46.251.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=25.15.247.178 spt=45663 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:37 rt=1697437597172 request=/comersus/store/comersus_message.asp requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a3df4-126a9df1 cn2=45663 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.15.247.178 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45663, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/comersus/store/comersus_message.asp", "localhostname": "WAFirewall", "localstarttime": "1697437597172 ", "message": "<185>Oct 16 01:26:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.46.251.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=25.15.247.178 spt=45663 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:37 rt=1697437597172 request=/comersus/store/comersus_message.asp requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a3df4-126a9df1 cn2=45663 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.15.247.178 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "25.15.247.178", "serverIP": "98.46.251.110", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.46.251.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=25.15.247.178 spt=45663 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:37 rt=1697437597172 request=/comersus/store/comersus_message.asp requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a3df4-126a9df1 cn2=45663 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.15.247.178 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=98.46.251.110 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=25.15.247.178 spt=45663 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:37 rt=1697437597172 request=/comersus/store/comersus_message.asp requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a3df4-126a9df1 cn2=45663 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=25.15.247.178 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45663 facilitycode: 23 facilitylabel: local7 fqdn: /comersus/store/comersus_message.asp localhostname: WAFirewall localstarttime: 1697437597172 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 25.15.247.178 serverIP: 98.46.251.110 userName: -
Explain this syslog message
<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.249.233.78 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.9.94.235 spt=57831 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:34 rt=1697437594693 request=/helpdezk/admin/login requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a3445-6a6965e7 cn2=57831 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.9.94.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 57831, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/helpdezk/admin/login", "localhostname": "WAFirewall", "localstarttime": "1697437594693 ", "message": "<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.249.233.78 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=233.9.94.235 spt=57831 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:34 rt=1697437594693 request=/helpdezk/admin/login requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a3445-6a6965e7 cn2=57831 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.9.94.235 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "233.9.94.235", "serverIP": "73.249.233.78", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.249.233.78 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.9.94.235 spt=57831 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:34 rt=1697437594693 request=/helpdezk/admin/login requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a3445-6a6965e7 cn2=57831 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.9.94.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=73.249.233.78 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.9.94.235 spt=57831 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:34 rt=1697437594693 request=/helpdezk/admin/login requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a3445-6a6965e7 cn2=57831 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.9.94.235 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 57831 facilitycode: 23 facilitylabel: local7 fqdn: /helpdezk/admin/login localhostname: WAFirewall localstarttime: 1697437594693 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 233.9.94.235 serverIP: 73.249.233.78 userName: -
Explain this syslog message
<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.227.141.83 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=242.139.197.114 spt=33907 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:34 rt=1697437594124 request=/static//////....//....//....//....//....//....//boot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a320c-d6d770e cn2=33907 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.139.197.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 33907, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/static//////....//....//....//....//....//....//boot.ini%00", "localhostname": "WAFirewall", "localstarttime": "1697437594124 ", "message": "<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.227.141.83 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=242.139.197.114 spt=33907 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:34 rt=1697437594124 request=/static//////....//....//....//....//....//....//boot.ini%00 requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a320c-d6d770e cn2=33907 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.139.197.114 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "242.139.197.114", "serverIP": "183.227.141.83", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.227.141.83 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=242.139.197.114 spt=33907 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:34 rt=1697437594124 request=/static//////....//....//....//....//....//....//boot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a320c-d6d770e cn2=33907 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.139.197.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:34 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=183.227.141.83 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=242.139.197.114 spt=33907 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:34 rt=1697437594124 request=/static//////....//....//....//....//....//....//boot.ini%00 requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a320c-d6d770e cn2=33907 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=242.139.197.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 33907 facilitycode: 23 facilitylabel: local7 fqdn: /static//////....//....//....//....//....//....//boot.ini%00 localhostname: WAFirewall localstarttime: 1697437594124 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 242.139.197.114 serverIP: 183.227.141.83 userName: -
Explain this syslog message
<185>Oct 16 01:26:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.33.90.16 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=164.120.25.158 spt=33203 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:33 rt=1697437593393 request=/wiki/wiki.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a2f31-49969c10 cn2=33203 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=164.120.25.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 33203, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/wiki/wiki.cgi", "localhostname": "WAFirewall", "localstarttime": "1697437593393 ", "message": "<185>Oct 16 01:26:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.33.90.16 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=164.120.25.158 spt=33203 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:33 rt=1697437593393 request=/wiki/wiki.cgi requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a2f31-49969c10 cn2=33203 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=164.120.25.158 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "164.120.25.158", "serverIP": "119.33.90.16", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.33.90.16 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=164.120.25.158 spt=33203 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:33 rt=1697437593393 request=/wiki/wiki.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a2f31-49969c10 cn2=33203 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=164.120.25.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=119.33.90.16 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=164.120.25.158 spt=33203 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:33 rt=1697437593393 request=/wiki/wiki.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a2f31-49969c10 cn2=33203 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=164.120.25.158 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 33203 facilitycode: 23 facilitylabel: local7 fqdn: /wiki/wiki.cgi localhostname: WAFirewall localstarttime: 1697437593393 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 164.120.25.158 serverIP: 119.33.90.16 userName: -
Explain this syslog message
<185>Oct 16 01:26:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.104.196.48 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=12.91.229.193 spt=36745 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:32 rt=1697437592981 request=/prowiki/wiki.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a2d95-439262f0 cn2=36745 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.91.229.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 36745, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/prowiki/wiki.cgi", "localhostname": "WAFirewall", "localstarttime": "1697437592981 ", "message": "<185>Oct 16 01:26:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.104.196.48 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=12.91.229.193 spt=36745 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:32 rt=1697437592981 request=/prowiki/wiki.cgi requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a2d95-439262f0 cn2=36745 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.91.229.193 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "12.91.229.193", "serverIP": "156.104.196.48", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.104.196.48 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=12.91.229.193 spt=36745 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:32 rt=1697437592981 request=/prowiki/wiki.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a2d95-439262f0 cn2=36745 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.91.229.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=156.104.196.48 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=12.91.229.193 spt=36745 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:32 rt=1697437592981 request=/prowiki/wiki.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a2d95-439262f0 cn2=36745 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=12.91.229.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 36745 facilitycode: 23 facilitylabel: local7 fqdn: /prowiki/wiki.cgi localhostname: WAFirewall localstarttime: 1697437592981 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 12.91.229.193 serverIP: 156.104.196.48 userName: -
Explain this syslog message
<185>Oct 16 01:26:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.177.8.200 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=75.81.235.236 spt=47523 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:29 rt=1697437589224 request=/id_dss requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a1ee8-498e9bcc cn2=47523 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=75.81.235.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 47523, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/id_dss", "localhostname": "WAFirewall", "localstarttime": "1697437589224 ", "message": "<185>Oct 16 01:26:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.177.8.200 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=75.81.235.236 spt=47523 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:29 rt=1697437589224 request=/id_dss requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a1ee8-498e9bcc cn2=47523 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=75.81.235.236 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "75.81.235.236", "serverIP": "104.177.8.200", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.177.8.200 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=75.81.235.236 spt=47523 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:29 rt=1697437589224 request=/id_dss requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a1ee8-498e9bcc cn2=47523 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=75.81.235.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:29 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.177.8.200 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=75.81.235.236 spt=47523 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:29 rt=1697437589224 request=/id_dss requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a1ee8-498e9bcc cn2=47523 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=75.81.235.236 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 47523 facilitycode: 23 facilitylabel: local7 fqdn: /id_dss localhostname: WAFirewall localstarttime: 1697437589224 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 75.81.235.236 serverIP: 104.177.8.200 userName: -
Explain this syslog message
<185>Oct 16 01:26:23 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.205.62.222 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.53.205.193 spt=35683 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:23 rt=1697437583919 request=///////....//....//....//....//....//....//windows/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a0a2f-d6a75f2 cn2=35683 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.53.205.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 35683, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "///////....//....//....//....//....//....//windows/win.ini", "localhostname": "WAFirewall", "localstarttime": "1697437583919 ", "message": "<185>Oct 16 01:26:23 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.205.62.222 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=65.53.205.193 spt=35683 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:23 rt=1697437583919 request=///////....//....//....//....//....//....//windows/win.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a0a2f-d6a75f2 cn2=35683 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.53.205.193 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "65.53.205.193", "serverIP": "205.205.62.222", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:23 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.205.62.222 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.53.205.193 spt=35683 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:23 rt=1697437583919 request=///////....//....//....//....//....//....//windows/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a0a2f-d6a75f2 cn2=35683 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.53.205.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:23 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=205.205.62.222 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=65.53.205.193 spt=35683 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:23 rt=1697437583919 request=///////....//....//....//....//....//....//windows/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a0a2f-d6a75f2 cn2=35683 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=65.53.205.193 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 35683 facilitycode: 23 facilitylabel: local7 fqdn: ///////....//....//....//....//....//....//windows/win.ini localhostname: WAFirewall localstarttime: 1697437583919 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 65.53.205.193 serverIP: 205.205.62.222 userName: -
Explain this syslog message
<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.27.65.206 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.243.109.82 spt=47163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.243.109.82 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 47163, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/database.sql", "localhostname": "WAFirewall", "localstarttime": "1697437603607 ", "message": "<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.27.65.206 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=180.243.109.82 spt=47163 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.243.109.82 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "180.243.109.82", "serverIP": "34.27.65.206", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.27.65.206 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.243.109.82 spt=47163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.243.109.82 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:43 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=34.27.65.206 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.243.109.82 spt=47163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:43 rt=1697437603607 request=/database.sql requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a5716-44996728 cn2=47163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.243.109.82 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 47163 facilitycode: 23 facilitylabel: local7 fqdn: /database.sql localhostname: WAFirewall localstarttime: 1697437603607 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 180.243.109.82 serverIP: 34.27.65.206 userName: -
Explain this syslog message
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.88.69.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.255.242.138 spt=45213 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.255.242.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 45213, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/static//////....//....//....//....//....//....//winnt/win.ini", "localhostname": "WAFirewall", "localstarttime": "1697437600838 ", "message": "<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.88.69.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=56.255.242.138 spt=45213 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.255.242.138 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleType:GLOBAL", "ProxyIP:143.244.39.22" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "56.255.242.138", "serverIP": "62.88.69.49", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.88.69.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.255.242.138 spt=45213 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.255.242.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 16 01:26:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=62.88.69.49 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=56.255.242.138 spt=45213 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:40 rt=1697437600838 request=/static//////....//....//....//....//....//....//winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372a4c46-706193a1 cn2=45213 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=56.255.242.138 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 45213 facilitycode: 23 facilitylabel: local7 fqdn: /static//////....//....//....//....//....//....//winnt/win.ini localhostname: WAFirewall localstarttime: 1697437600838 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22'] vendorcode: 342 streamName: barracuda_waf clientIP: 56.255.242.138 serverIP: 62.88.69.49 userName: -
Explain this syslog message