input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Oct 16 01:26:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=10.171.14.232 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=182.146.233.180 spt=50163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:12 rt=1697437572054 request=/dcforum/dcforum.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729dbd6-389196f2 cn2=50163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=182.146.233.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=10.171.14.232 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=182.146.233.180 spt=50163 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:12 rt=1697437572054 request=/dcforum/dcforum.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729dbd6-389196f2 cn2=50163 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=182.146.233.180 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 50163
facilitycode: 23
facilitylabel: local7
fqdn: /dcforum/dcforum.cgi
localhostname: WAFirewall
localstarttime: 1697437572054
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 182.146.233.180
serverIP: 10.171.14.232
userName: - | Explain this syslog message |
<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.205.239.252 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.150.143.147 spt=60199 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:11 rt=1697437571842 request=/\\\\\\\\\\\\.../.../.../.../.../.../winnt/win.ini%23vt/test requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729db02-379082e8 cn2=60199 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.150.143.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 60199,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/\\\\\\\\\\\\\\\\\\\\\\\\.../.../.../.../.../.../winnt/win.ini%23vt/test",
"localhostname": "WAFirewall",
"localstarttime": "1697437571842 ",
"message": "<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.205.239.252 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=28.150.143.147 spt=60199 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:11 rt=1697437571842 request=/\\\\\\\\\\\\\\\\\\\\\\\\.../.../.../.../.../.../winnt/win.ini%23vt/test requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729db02-379082e8 cn2=60199 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.150.143.147 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "28.150.143.147",
"serverIP": "104.205.239.252",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.205.239.252 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.150.143.147 spt=60199 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:11 rt=1697437571842 request=/\\\\\\\\\\\\.../.../.../.../.../.../winnt/win.ini%23vt/test requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729db02-379082e8 cn2=60199 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.150.143.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=104.205.239.252 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=28.150.143.147 spt=60199 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:11 rt=1697437571842 request=/\\\\\\\\\\\\.../.../.../.../.../.../winnt/win.ini%23vt/test requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729db02-379082e8 cn2=60199 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=28.150.143.147 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 60199
facilitycode: 23
facilitylabel: local7
fqdn: /\\\\\\\\\\\\.../.../.../.../.../.../winnt/win.ini%23vt/test
localhostname: WAFirewall
localstarttime: 1697437571842
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 28.150.143.147
serverIP: 104.205.239.252
userName: - | Explain this syslog message |
<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.239.129.90 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=1.29.238.50 spt=48753 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:11 rt=1697437571629 request=/dcforum.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729da2d-6c656dca cn2=48753 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=1.29.238.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 48753,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/dcforum.cgi",
"localhostname": "WAFirewall",
"localstarttime": "1697437571629 ",
"message": "<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.239.129.90 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=1.29.238.50 spt=48753 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:11 rt=1697437571629 request=/dcforum.cgi requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729da2d-6c656dca cn2=48753 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=1.29.238.50 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "1.29.238.50",
"serverIP": "42.239.129.90",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.239.129.90 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=1.29.238.50 spt=48753 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:11 rt=1697437571629 request=/dcforum.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729da2d-6c656dca cn2=48753 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=1.29.238.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=42.239.129.90 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=1.29.238.50 spt=48753 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:11 rt=1697437571629 request=/dcforum.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729da2d-6c656dca cn2=48753 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=1.29.238.50 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 48753
facilitycode: 23
facilitylabel: local7
fqdn: /dcforum.cgi
localhostname: WAFirewall
localstarttime: 1697437571629
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 1.29.238.50
serverIP: 42.239.129.90
userName: - | Explain this syslog message |
<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=35.29.122.86 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=16.42.68.80 spt=39327 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:11 rt=1697437571428 request=/\\\\\\\\\\\\.../.../.../.../.../.../winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d963-7460b899 cn2=39327 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=16.42.68.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 39327,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/\\\\\\\\\\\\\\\\\\\\\\\\.../.../.../.../.../.../winnt/win.ini",
"localhostname": "WAFirewall",
"localstarttime": "1697437571428 ",
"message": "<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=35.29.122.86 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=16.42.68.80 spt=39327 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:11 rt=1697437571428 request=/\\\\\\\\\\\\\\\\\\\\\\\\.../.../.../.../.../.../winnt/win.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729d963-7460b899 cn2=39327 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=16.42.68.80 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "16.42.68.80",
"serverIP": "35.29.122.86",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=35.29.122.86 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=16.42.68.80 spt=39327 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:11 rt=1697437571428 request=/\\\\\\\\\\\\.../.../.../.../.../.../winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d963-7460b899 cn2=39327 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=16.42.68.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=35.29.122.86 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=16.42.68.80 spt=39327 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:11 rt=1697437571428 request=/\\\\\\\\\\\\.../.../.../.../.../.../winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d963-7460b899 cn2=39327 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=16.42.68.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 39327
facilitycode: 23
facilitylabel: local7
fqdn: /\\\\\\\\\\\\.../.../.../.../.../.../winnt/win.ini
localhostname: WAFirewall
localstarttime: 1697437571428
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 16.42.68.80
serverIP: 35.29.122.86
userName: - | Explain this syslog message |
<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=38.82.140.87 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.124.136.32 spt=53347 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:26:11 rt=1697437571326 request=/filemanager/ajaxfilemanager/ajax_create_folder.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d8fe-34997035 cn2=53347 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.124.136.32 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 53347,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/filemanager/ajaxfilemanager/ajax_create_folder.php",
"localhostname": "WAFirewall",
"localstarttime": "1697437571326 ",
"message": "<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=38.82.140.87 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=154.124.136.32 spt=53347 requestMethod=POST app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:11 rt=1697437571326 request=/filemanager/ajaxfilemanager/ajax_create_folder.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729d8fe-34997035 cn2=53347 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.124.136.32 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "154.124.136.32",
"serverIP": "38.82.140.87",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=38.82.140.87 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.124.136.32 spt=53347 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:26:11 rt=1697437571326 request=/filemanager/ajaxfilemanager/ajax_create_folder.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d8fe-34997035 cn2=53347 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.124.136.32 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=38.82.140.87 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=154.124.136.32 spt=53347 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:26:11 rt=1697437571326 request=/filemanager/ajaxfilemanager/ajax_create_folder.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d8fe-34997035 cn2=53347 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=154.124.136.32 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53347
facilitycode: 23
facilitylabel: local7
fqdn: /filemanager/ajaxfilemanager/ajax_create_folder.php
localhostname: WAFirewall
localstarttime: 1697437571326
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 154.124.136.32
serverIP: 38.82.140.87
userName: - | Explain this syslog message |
<185>Oct 16 01:26:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=152.147.119.153 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.11.153.54 spt=58673 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:26:10 rt=1697437570500 request=/fm/ajaxfilemanager/ajax_create_folder.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d5c4-6c6471bb cn2=58673 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.11.153.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 58673,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/fm/ajaxfilemanager/ajax_create_folder.php",
"localhostname": "WAFirewall",
"localstarttime": "1697437570500 ",
"message": "<185>Oct 16 01:26:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=152.147.119.153 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=78.11.153.54 spt=58673 requestMethod=POST app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:10 rt=1697437570500 request=/fm/ajaxfilemanager/ajax_create_folder.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729d5c4-6c6471bb cn2=58673 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.11.153.54 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "78.11.153.54",
"serverIP": "152.147.119.153",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=152.147.119.153 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.11.153.54 spt=58673 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:26:10 rt=1697437570500 request=/fm/ajaxfilemanager/ajax_create_folder.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d5c4-6c6471bb cn2=58673 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.11.153.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=152.147.119.153 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=78.11.153.54 spt=58673 requestMethod=POST app=HTTP requestContext="-" start=Oct 16 2023 01:26:10 rt=1697437570500 request=/fm/ajaxfilemanager/ajax_create_folder.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d5c4-6c6471bb cn2=58673 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.11.153.54 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 58673
facilitycode: 23
facilitylabel: local7
fqdn: /fm/ajaxfilemanager/ajax_create_folder.php
localhostname: WAFirewall
localstarttime: 1697437570500
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 78.11.153.54
serverIP: 152.147.119.153
userName: - | Explain this syslog message |
<185>Oct 16 01:26:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=172.221.88.6 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=227.60.204.134 spt=52205 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:10 rt=1697437570047 request=/themes/default/header.inc.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d3ff-7462bca9 cn2=52205 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.60.204.134 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 52205,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/themes/default/header.inc.php",
"localhostname": "WAFirewall",
"localstarttime": "1697437570047 ",
"message": "<185>Oct 16 01:26:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=172.221.88.6 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=227.60.204.134 spt=52205 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:10 rt=1697437570047 request=/themes/default/header.inc.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729d3ff-7462bca9 cn2=52205 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.60.204.134 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "227.60.204.134",
"serverIP": "172.221.88.6",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=172.221.88.6 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=227.60.204.134 spt=52205 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:10 rt=1697437570047 request=/themes/default/header.inc.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d3ff-7462bca9 cn2=52205 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.60.204.134 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:10 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=172.221.88.6 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=227.60.204.134 spt=52205 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:10 rt=1697437570047 request=/themes/default/header.inc.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d3ff-7462bca9 cn2=52205 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=227.60.204.134 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 52205
facilitycode: 23
facilitylabel: local7
fqdn: /themes/default/header.inc.php
localhostname: WAFirewall
localstarttime: 1697437570047
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 227.60.204.134
serverIP: 172.221.88.6
userName: - | Explain this syslog message |
<185>Oct 16 01:26:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=6.91.8.231 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.54.230.11 spt=36131 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:09 rt=1697437569696 request=/media/plugins/system/shadowbox/min/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d2a0-3923214 cn2=36131 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.54.230.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 36131,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/media/plugins/system/shadowbox/min/index.php",
"localhostname": "WAFirewall",
"localstarttime": "1697437569696 ",
"message": "<185>Oct 16 01:26:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=6.91.8.231 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=241.54.230.11 spt=36131 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:09 rt=1697437569696 request=/media/plugins/system/shadowbox/min/index.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729d2a0-3923214 cn2=36131 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.54.230.11 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "241.54.230.11",
"serverIP": "6.91.8.231",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=6.91.8.231 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.54.230.11 spt=36131 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:09 rt=1697437569696 request=/media/plugins/system/shadowbox/min/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d2a0-3923214 cn2=36131 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.54.230.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=6.91.8.231 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=241.54.230.11 spt=36131 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:09 rt=1697437569696 request=/media/plugins/system/shadowbox/min/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729d2a0-3923214 cn2=36131 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=241.54.230.11 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 36131
facilitycode: 23
facilitylabel: local7
fqdn: /media/plugins/system/shadowbox/min/index.php
localhostname: WAFirewall
localstarttime: 1697437569696
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 241.54.230.11
serverIP: 6.91.8.231
userName: - | Explain this syslog message |
<185>Oct 16 01:26:07 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=33.35.46.155 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=111.187.224.91 spt=33199 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:07 rt=1697437567897 request=///////.../.../.../.../.../.../winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729cb99-7761d1a5 cn2=33199 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=111.187.224.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 33199,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "///////.../.../.../.../.../.../winnt/win.ini",
"localhostname": "WAFirewall",
"localstarttime": "1697437567897 ",
"message": "<185>Oct 16 01:26:07 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=33.35.46.155 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=111.187.224.91 spt=33199 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:07 rt=1697437567897 request=///////.../.../.../.../.../.../winnt/win.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729cb99-7761d1a5 cn2=33199 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=111.187.224.91 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "111.187.224.91",
"serverIP": "33.35.46.155",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:07 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=33.35.46.155 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=111.187.224.91 spt=33199 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:07 rt=1697437567897 request=///////.../.../.../.../.../.../winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729cb99-7761d1a5 cn2=33199 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=111.187.224.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:07 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=33.35.46.155 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=111.187.224.91 spt=33199 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:07 rt=1697437567897 request=///////.../.../.../.../.../.../winnt/win.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729cb99-7761d1a5 cn2=33199 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=111.187.224.91 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 33199
facilitycode: 23
facilitylabel: local7
fqdn: ///////.../.../.../.../.../.../winnt/win.ini
localhostname: WAFirewall
localstarttime: 1697437567897
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 111.187.224.91
serverIP: 33.35.46.155
userName: - | Explain this syslog message |
<185>Oct 16 01:26:07 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=48.120.67.109 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=251.37.209.233 spt=34127 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:07 rt=1697437567620 request=/manpage/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729ca84-10628cad cn2=34127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=251.37.209.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 34127,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/manpage/index.php",
"localhostname": "WAFirewall",
"localstarttime": "1697437567620 ",
"message": "<185>Oct 16 01:26:07 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=48.120.67.109 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=251.37.209.233 spt=34127 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:07 rt=1697437567620 request=/manpage/index.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729ca84-10628cad cn2=34127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=251.37.209.233 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "251.37.209.233",
"serverIP": "48.120.67.109",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:07 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=48.120.67.109 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=251.37.209.233 spt=34127 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:07 rt=1697437567620 request=/manpage/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729ca84-10628cad cn2=34127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=251.37.209.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:07 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=48.120.67.109 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=251.37.209.233 spt=34127 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:07 rt=1697437567620 request=/manpage/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729ca84-10628cad cn2=34127 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=251.37.209.233 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 34127
facilitycode: 23
facilitylabel: local7
fqdn: /manpage/index.php
localhostname: WAFirewall
localstarttime: 1697437567620
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 251.37.209.233
serverIP: 48.120.67.109
userName: - | Explain this syslog message |
<185>Oct 16 01:26:05 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.107.226.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.93.76.166 spt=55713 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:05 rt=1697437565719 request=/cgi-sys/entropybanner.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729c317-36938301 cn2=55713 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.93.76.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55713,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/cgi-sys/entropybanner.cgi",
"localhostname": "WAFirewall",
"localstarttime": "1697437565719 ",
"message": "<185>Oct 16 01:26:05 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.107.226.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=191.93.76.166 spt=55713 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:05 rt=1697437565719 request=/cgi-sys/entropybanner.cgi requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729c317-36938301 cn2=55713 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.93.76.166 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "191.93.76.166",
"serverIP": "233.107.226.45",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:05 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.107.226.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.93.76.166 spt=55713 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:05 rt=1697437565719 request=/cgi-sys/entropybanner.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729c317-36938301 cn2=55713 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.93.76.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:05 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.107.226.45 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=191.93.76.166 spt=55713 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:05 rt=1697437565719 request=/cgi-sys/entropybanner.cgi requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729c317-36938301 cn2=55713 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=191.93.76.166 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55713
facilitycode: 23
facilitylabel: local7
fqdn: /cgi-sys/entropybanner.cgi
localhostname: WAFirewall
localstarttime: 1697437565719
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 191.93.76.166
serverIP: 233.107.226.45
userName: - | Explain this syslog message |
<185>Oct 16 01:26:05 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=8.19.140.13 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.184.233.85 spt=58025 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:05 rt=1697437565185 request=/lite/admin.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729c101-66e2025 cn2=58025 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.184.233.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 58025,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/lite/admin.php",
"localhostname": "WAFirewall",
"localstarttime": "1697437565185 ",
"message": "<185>Oct 16 01:26:05 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=8.19.140.13 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=248.184.233.85 spt=58025 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:05 rt=1697437565185 request=/lite/admin.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729c101-66e2025 cn2=58025 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.184.233.85 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "248.184.233.85",
"serverIP": "8.19.140.13",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:05 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=8.19.140.13 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.184.233.85 spt=58025 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:05 rt=1697437565185 request=/lite/admin.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729c101-66e2025 cn2=58025 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.184.233.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:05 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=8.19.140.13 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.184.233.85 spt=58025 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:05 rt=1697437565185 request=/lite/admin.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729c101-66e2025 cn2=58025 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.184.233.85 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 58025
facilitycode: 23
facilitylabel: local7
fqdn: /lite/admin.php
localhostname: WAFirewall
localstarttime: 1697437565185
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 248.184.233.85
serverIP: 8.19.140.13
userName: - | Explain this syslog message |
<185>Oct 16 01:26:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.199.222.140 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.120.22.225 spt=55107 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:03 rt=1697437563886 request=/static\\\\\\\\\\\\.../.../.../.../.../.../boot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729bbee-369c7c4f cn2=55107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.120.22.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55107,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/static\\\\\\\\\\\\\\\\\\\\\\\\.../.../.../.../.../.../boot.ini",
"localhostname": "WAFirewall",
"localstarttime": "1697437563886 ",
"message": "<185>Oct 16 01:26:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.199.222.140 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=57.120.22.225 spt=55107 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:03 rt=1697437563886 request=/static\\\\\\\\\\\\\\\\\\\\\\\\.../.../.../.../.../.../boot.ini requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729bbee-369c7c4f cn2=55107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.120.22.225 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "57.120.22.225",
"serverIP": "106.199.222.140",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.199.222.140 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.120.22.225 spt=55107 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:03 rt=1697437563886 request=/static\\\\\\\\\\\\.../.../.../.../.../.../boot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729bbee-369c7c4f cn2=55107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.120.22.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=106.199.222.140 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=57.120.22.225 spt=55107 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:03 rt=1697437563886 request=/static\\\\\\\\\\\\.../.../.../.../.../.../boot.ini requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729bbee-369c7c4f cn2=55107 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=57.120.22.225 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55107
facilitycode: 23
facilitylabel: local7
fqdn: /static\\\\\\\\\\\\.../.../.../.../.../.../boot.ini
localhostname: WAFirewall
localstarttime: 1697437563886
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 57.120.22.225
serverIP: 106.199.222.140
userName: - | Explain this syslog message |
<185>Oct 16 01:26:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=92.43.232.144 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=64.61.191.171 spt=57099 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:03 rt=1697437563558 request=/awstatstotals/awstatstotals.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729baa6-d36bc62c cn2=57099 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=64.61.191.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 57099,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/awstatstotals/awstatstotals.php",
"localhostname": "WAFirewall",
"localstarttime": "1697437563558 ",
"message": "<185>Oct 16 01:26:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=92.43.232.144 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=64.61.191.171 spt=57099 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:03 rt=1697437563558 request=/awstatstotals/awstatstotals.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729baa6-d36bc62c cn2=57099 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=64.61.191.171 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "64.61.191.171",
"serverIP": "92.43.232.144",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=92.43.232.144 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=64.61.191.171 spt=57099 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:03 rt=1697437563558 request=/awstatstotals/awstatstotals.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729baa6-d36bc62c cn2=57099 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=64.61.191.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:03 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=92.43.232.144 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=64.61.191.171 spt=57099 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:03 rt=1697437563558 request=/awstatstotals/awstatstotals.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729baa6-d36bc62c cn2=57099 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=64.61.191.171 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 57099
facilitycode: 23
facilitylabel: local7
fqdn: /awstatstotals/awstatstotals.php
localhostname: WAFirewall
localstarttime: 1697437563558
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 64.61.191.171
serverIP: 92.43.232.144
userName: - | Explain this syslog message |
<185>Oct 16 01:26:02 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=152.153.245.231 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=19.230.50.39 spt=33547 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:02 rt=1697437562991 request=/lcds-samples/messagebroker/httpsecure requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729b86f-d372c56d cn2=33547 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=19.230.50.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 33547,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/lcds-samples/messagebroker/httpsecure",
"localhostname": "WAFirewall",
"localstarttime": "1697437562991 ",
"message": "<185>Oct 16 01:26:02 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=152.153.245.231 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=19.230.50.39 spt=33547 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:26:02 rt=1697437562991 request=/lcds-samples/messagebroker/httpsecure requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b3729b86f-d372c56d cn2=33547 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=19.230.50.39 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "19.230.50.39",
"serverIP": "152.153.245.231",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:26:02 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=152.153.245.231 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=19.230.50.39 spt=33547 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:02 rt=1697437562991 request=/lcds-samples/messagebroker/httpsecure requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729b86f-d372c56d cn2=33547 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=19.230.50.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:26:02 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=152.153.245.231 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=19.230.50.39 spt=33547 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:26:02 rt=1697437562991 request=/lcds-samples/messagebroker/httpsecure requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b3729b86f-d372c56d cn2=33547 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=19.230.50.39 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 33547
facilitycode: 23
facilitylabel: local7
fqdn: /lcds-samples/messagebroker/httpsecure
localhostname: WAFirewall
localstarttime: 1697437562991
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 19.230.50.39
serverIP: 152.153.245.231
userName: - | Explain this syslog message |
<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=212.176.243.144 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=23.32.234.176 spt=34317 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:18:11 rt=1697437091296 request=/fuzzylime/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372285e0-10960b37 cn2=34317 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=23.32.234.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 34317,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/fuzzylime/index.php",
"localhostname": "WAFirewall",
"localstarttime": "1697437091296 ",
"message": "<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=212.176.243.144 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=23.32.234.176 spt=34317 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:18:11 rt=1697437091296 request=/fuzzylime/index.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372285e0-10960b37 cn2=34317 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=23.32.234.176 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "23.32.234.176",
"serverIP": "212.176.243.144",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=212.176.243.144 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=23.32.234.176 spt=34317 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:18:11 rt=1697437091296 request=/fuzzylime/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372285e0-10960b37 cn2=34317 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=23.32.234.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=212.176.243.144 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=23.32.234.176 spt=34317 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:18:11 rt=1697437091296 request=/fuzzylime/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372285e0-10960b37 cn2=34317 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=23.32.234.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 34317
facilitycode: 23
facilitylabel: local7
fqdn: /fuzzylime/index.php
localhostname: WAFirewall
localstarttime: 1697437091296
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 23.32.234.176
serverIP: 212.176.243.144
userName: - | Explain this syslog message |
<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.37.6.9 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=108.44.102.69 spt=55675 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:18:11 rt=1697437091123 request=/SimpleID/www/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37228533-135eaa8e cn2=55675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.44.102.69 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55675,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/SimpleID/www/index.php",
"localhostname": "WAFirewall",
"localstarttime": "1697437091123 ",
"message": "<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.37.6.9 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=108.44.102.69 spt=55675 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:18:11 rt=1697437091123 request=/SimpleID/www/index.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37228533-135eaa8e cn2=55675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.44.102.69 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "108.44.102.69",
"serverIP": "60.37.6.9",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.37.6.9 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=108.44.102.69 spt=55675 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:18:11 rt=1697437091123 request=/SimpleID/www/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37228533-135eaa8e cn2=55675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.44.102.69 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=60.37.6.9 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=108.44.102.69 spt=55675 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:18:11 rt=1697437091123 request=/SimpleID/www/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37228533-135eaa8e cn2=55675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=108.44.102.69 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55675
facilitycode: 23
facilitylabel: local7
fqdn: /SimpleID/www/index.php
localhostname: WAFirewall
localstarttime: 1697437091123
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 108.44.102.69
serverIP: 60.37.6.9
userName: - | Explain this syslog message |
<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=144.171.165.217 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=24.146.224.48 spt=34317 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:18:11 rt=1697437091296 request=/fuzzylime/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372285e0-10960b37 cn2=34317 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=24.146.224.48 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 34317,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/fuzzylime/index.php",
"localhostname": "WAFirewall",
"localstarttime": "1697437091296 ",
"message": "<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=144.171.165.217 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=24.146.224.48 spt=34317 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:18:11 rt=1697437091296 request=/fuzzylime/index.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b372285e0-10960b37 cn2=34317 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=24.146.224.48 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "24.146.224.48",
"serverIP": "144.171.165.217",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=144.171.165.217 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=24.146.224.48 spt=34317 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:18:11 rt=1697437091296 request=/fuzzylime/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372285e0-10960b37 cn2=34317 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=24.146.224.48 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=144.171.165.217 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=24.146.224.48 spt=34317 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:18:11 rt=1697437091296 request=/fuzzylime/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b372285e0-10960b37 cn2=34317 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=24.146.224.48 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 34317
facilitycode: 23
facilitylabel: local7
fqdn: /fuzzylime/index.php
localhostname: WAFirewall
localstarttime: 1697437091296
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 24.146.224.48
serverIP: 144.171.165.217
userName: - | Explain this syslog message |
<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=9.118.160.16 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=54.48.215.55 spt=55675 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:18:11 rt=1697437091123 request=/SimpleID/www/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37228533-135eaa8e cn2=55675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=54.48.215.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55675,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/SimpleID/www/index.php",
"localhostname": "WAFirewall",
"localstarttime": "1697437091123 ",
"message": "<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=9.118.160.16 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=54.48.215.55 spt=55675 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:18:11 rt=1697437091123 request=/SimpleID/www/index.php requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37228533-135eaa8e cn2=55675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=54.48.215.55 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "54.48.215.55",
"serverIP": "9.118.160.16",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=9.118.160.16 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=54.48.215.55 spt=55675 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:18:11 rt=1697437091123 request=/SimpleID/www/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37228533-135eaa8e cn2=55675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=54.48.215.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:18:11 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=9.118.160.16 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=54.48.215.55 spt=55675 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:18:11 rt=1697437091123 request=/SimpleID/www/index.php requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37228533-135eaa8e cn2=55675 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=54.48.215.55 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55675
facilitycode: 23
facilitylabel: local7
fqdn: /SimpleID/www/index.php
localhostname: WAFirewall
localstarttime: 1697437091123
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 54.48.215.55
serverIP: 9.118.160.16
userName: - | Explain this syslog message |
<185>Oct 16 01:23:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=191.196.117.80 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=219.135.111.108 spt=42191 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:23:32 rt=1697437412211 request=/dms/dlasx.kspx requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37276b73-44976923 cn2=42191 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=219.135.111.108 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 42191,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/dms/dlasx.kspx",
"localhostname": "WAFirewall",
"localstarttime": "1697437412211 ",
"message": "<185>Oct 16 01:23:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=191.196.117.80 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=219.135.111.108 spt=42191 requestMethod=GET app=HTTP requestContext=\"-\" start=Oct 16 2023 01:23:32 rt=1697437412211 request=/dms/dlasx.kspx requestClientApplication=\"Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)\" dvchost=WAFirewall externalId=18b37276b73-44976923 cn2=42191 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=219.135.111.108 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleType:GLOBAL",
"ProxyIP:143.244.39.22"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "219.135.111.108",
"serverIP": "191.196.117.80",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 16 01:23:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=191.196.117.80 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=219.135.111.108 spt=42191 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:23:32 rt=1697437412211 request=/dms/dlasx.kspx requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37276b73-44976923 cn2=42191 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=219.135.111.108 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 16 01:23:32 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=191.196.117.80 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=219.135.111.108 spt=42191 requestMethod=GET app=HTTP requestContext="-" start=Oct 16 2023 01:23:32 rt=1697437412211 request=/dms/dlasx.kspx requestClientApplication="Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" dvchost=WAFirewall externalId=18b37276b73-44976923 cn2=42191 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=219.135.111.108 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 42191
facilitycode: 23
facilitylabel: local7
fqdn: /dms/dlasx.kspx
localhostname: WAFirewall
localstarttime: 1697437412211
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleType:GLOBAL', 'ProxyIP:143.244.39.22']
vendorcode: 342
streamName: barracuda_waf
clientIP: 219.135.111.108
serverIP: 191.196.117.80
userName: - | Explain this syslog message |
<172>Feb 14 2023 18:42:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:163.82.39.49/52344 dst outside:251.197.209.83/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 14 2023 18:42:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:163.82.39.49/52344 dst outside:251.197.209.83/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 52344,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "163.82.39.49",
"serverIP": "251.197.209.83"
} | Create a JSON artifact from the message |
<172>Feb 14 2023 18:42:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:163.82.39.49/52344 dst outside:251.197.209.83/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 14 2023 18:42:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:163.82.39.49/52344 dst outside:251.197.209.83/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 52344
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 163.82.39.49
serverIP: 251.197.209.83 | Explain this syslog message |
<172>Feb 14 2023 18:42:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:82.119.237.240/52344 dst outside:173.92.184.174/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 14 2023 18:42:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:82.119.237.240/52344 dst outside:173.92.184.174/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 52344,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "82.119.237.240",
"serverIP": "173.92.184.174"
} | Create a JSON artifact from the message |
<172>Feb 14 2023 18:42:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:82.119.237.240/52344 dst outside:173.92.184.174/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 14 2023 18:42:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:82.119.237.240/52344 dst outside:173.92.184.174/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 52344
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 82.119.237.240
serverIP: 173.92.184.174 | Explain this syslog message |
<172>Apr 18 2023 12:02:12 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:10.102.110.221/50078 dst outside:95.229.189.8/80 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Apr 18 2023 12:02:12 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:10.102.110.221/50078 dst outside:95.229.189.8/80 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 50078,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "10.102.110.221",
"serverIP": "95.229.189.8"
} | Create a JSON artifact from the message |
<172>Apr 18 2023 12:02:12 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:10.102.110.221/50078 dst outside:95.229.189.8/80 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Apr 18 2023 12:02:12 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:10.102.110.221/50078 dst outside:95.229.189.8/80 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 80
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 50078
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 10.102.110.221
serverIP: 95.229.189.8 | Explain this syslog message |
<172>Apr 18 2023 12:02:12 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:62.119.6.166/50078 dst outside:180.109.173.10/80 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Apr 18 2023 12:02:12 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:62.119.6.166/50078 dst outside:180.109.173.10/80 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 50078,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "62.119.6.166",
"serverIP": "180.109.173.10"
} | Create a JSON artifact from the message |
<172>Apr 18 2023 12:02:12 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:62.119.6.166/50078 dst outside:180.109.173.10/80 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Apr 18 2023 12:02:12 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:62.119.6.166/50078 dst outside:180.109.173.10/80 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 80
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 50078
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 62.119.6.166
serverIP: 180.109.173.10 | Explain this syslog message |
<172>Apr 18 2023 12:11:45 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:25.90.119.109/62335 dst outside:105.141.51.244/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Apr 18 2023 12:11:45 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:25.90.119.109/62335 dst outside:105.141.51.244/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 62335,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "25.90.119.109",
"serverIP": "105.141.51.244"
} | Create a JSON artifact from the message |
<172>Apr 18 2023 12:11:45 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:25.90.119.109/62335 dst outside:105.141.51.244/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Apr 18 2023 12:11:45 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:25.90.119.109/62335 dst outside:105.141.51.244/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 62335
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 25.90.119.109
serverIP: 105.141.51.244 | Explain this syslog message |
<172>Apr 18 2023 12:11:45 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:155.102.22.122/62335 dst outside:121.110.217.68/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Apr 18 2023 12:11:45 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:155.102.22.122/62335 dst outside:121.110.217.68/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 62335,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "155.102.22.122",
"serverIP": "121.110.217.68"
} | Create a JSON artifact from the message |
<172>Apr 18 2023 12:11:45 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:155.102.22.122/62335 dst outside:121.110.217.68/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Apr 18 2023 12:11:45 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:155.102.22.122/62335 dst outside:121.110.217.68/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 62335
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 155.102.22.122
serverIP: 121.110.217.68 | Explain this syslog message |
<132>Sep 29 16:50:23 shareholders drupal: https://shareholders.wayne.com|1696006223|access denied|18.88.1.35|https://shareholders.wayne.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Sep 29 16:50:23",
"message": "<132>Sep 29 16:50:23 shareholders drupal: https://shareholders.wayne.com|1696006223|access denied|18.88.1.35|https://shareholders.wayne.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1696006223",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "18.88.1.35"
} | Create a JSON artifact from the message |
<132>Sep 29 16:50:23 shareholders drupal: https://shareholders.wayne.com|1696006223|access denied|18.88.1.35|https://shareholders.wayne.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Sep 29 16:50:23 shareholders drupal: https://shareholders.wayne.com|1696006223|access denied|18.88.1.35|https://shareholders.wayne.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Sep 29 16:50:23
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1696006223
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 18.88.1.35 | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"181.63.221.58","externalIp":"20.22.122.202","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=181.63.221.58 ::: serverIP=20.22.122.202 ::: userName=johndoe ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:15:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"181.63.221.58\",\"externalIp\":\"20.22.122.202\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:15:28.000Z\"} ::: clientIP=181.63.221.58 ::: serverIP=20.22.122.202 ::: userName=johndoe ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "181.63.221.58",
"serverIP": "20.22.122.202",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"181.63.221.58","externalIp":"20.22.122.202","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=181.63.221.58 ::: serverIP=20.22.122.202 ::: userName=johndoe ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"181.63.221.58","externalIp":"20.22.122.202","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=181.63.221.58 ::: serverIP=20.22.122.202 ::: userName=johndoe ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:15:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 181.63.221.58
serverIP: 20.22.122.202
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"17.197.105.31","externalIp":"191.58.97.0","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=17.197.105.31 ::: serverIP=191.58.97.0 ::: userName=alice ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:15:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"17.197.105.31\",\"externalIp\":\"191.58.97.0\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:15:28.000Z\"} ::: clientIP=17.197.105.31 ::: serverIP=191.58.97.0 ::: userName=alice ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "17.197.105.31",
"serverIP": "191.58.97.0",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"17.197.105.31","externalIp":"191.58.97.0","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=17.197.105.31 ::: serverIP=191.58.97.0 ::: userName=alice ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"17.197.105.31","externalIp":"191.58.97.0","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=17.197.105.31 ::: serverIP=191.58.97.0 ::: userName=alice ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:15:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 17.197.105.31
serverIP: 191.58.97.0
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"163.187.135.230","externalIp":"68.201.191.233","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=163.187.135.230 ::: serverIP=68.201.191.233 ::: userName=nighthawk ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:15:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"163.187.135.230\",\"externalIp\":\"68.201.191.233\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:15:28.000Z\"} ::: clientIP=163.187.135.230 ::: serverIP=68.201.191.233 ::: userName=nighthawk ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "163.187.135.230",
"serverIP": "68.201.191.233",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"163.187.135.230","externalIp":"68.201.191.233","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=163.187.135.230 ::: serverIP=68.201.191.233 ::: userName=nighthawk ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"163.187.135.230","externalIp":"68.201.191.233","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=163.187.135.230 ::: serverIP=68.201.191.233 ::: userName=nighthawk ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:15:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 163.187.135.230
serverIP: 68.201.191.233
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"200.18.161.8","externalIp":"120.203.59.177","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=200.18.161.8 ::: serverIP=120.203.59.177 ::: userName=fish ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:15:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"200.18.161.8\",\"externalIp\":\"120.203.59.177\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:15:28.000Z\"} ::: clientIP=200.18.161.8 ::: serverIP=120.203.59.177 ::: userName=fish ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "200.18.161.8",
"serverIP": "120.203.59.177",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"200.18.161.8","externalIp":"120.203.59.177","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=200.18.161.8 ::: serverIP=120.203.59.177 ::: userName=fish ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"200.18.161.8","externalIp":"120.203.59.177","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=200.18.161.8 ::: serverIP=120.203.59.177 ::: userName=fish ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:15:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 200.18.161.8
serverIP: 120.203.59.177
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"12.224.114.206","externalIp":"226.215.214.67","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=12.224.114.206 ::: serverIP=226.215.214.67 ::: userName=bob ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:15:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"12.224.114.206\",\"externalIp\":\"226.215.214.67\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:15:28.000Z\"} ::: clientIP=12.224.114.206 ::: serverIP=226.215.214.67 ::: userName=bob ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "12.224.114.206",
"serverIP": "226.215.214.67",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"12.224.114.206","externalIp":"226.215.214.67","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=12.224.114.206 ::: serverIP=226.215.214.67 ::: userName=bob ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"12.224.114.206","externalIp":"226.215.214.67","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=12.224.114.206 ::: serverIP=226.215.214.67 ::: userName=bob ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:15:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 12.224.114.206
serverIP: 226.215.214.67
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"248.166.124.97","externalIp":"78.131.107.230","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=248.166.124.97 ::: serverIP=78.131.107.230 ::: userName=janedoe ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:15:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":535407927,\"originType\":\"Network Devices\",\"internalIp\":\"248.166.124.97\",\"externalIp\":\"78.131.107.230\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:15:28.000Z\"} ::: clientIP=248.166.124.97 ::: serverIP=78.131.107.230 ::: userName=janedoe ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "248.166.124.97",
"serverIP": "78.131.107.230",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"248.166.124.97","externalIp":"78.131.107.230","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=248.166.124.97 ::: serverIP=78.131.107.230 ::: userName=janedoe ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":535407927,"originType":"Network Devices","internalIp":"248.166.124.97","externalIp":"78.131.107.230","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:15:28.000Z"} ::: clientIP=248.166.124.97 ::: serverIP=78.131.107.230 ::: userName=janedoe ::: created_at=2022-05-26T15:15:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:15:28.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:15:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 248.166.124.97
serverIP: 78.131.107.230
userName: janedoe | Explain this syslog message |
<132>Dec 12 02:56:48 library4 drupal: https://library.wayne.com|1702349807|access denied|114.126.129.10|https://library.wayne.com/||0||node/21899 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "library4",
"localstarttime": "Dec 12 02:56:48",
"message": "<132>Dec 12 02:56:48 library4 drupal: https://library.wayne.com|1702349807|access denied|114.126.129.10|https://library.wayne.com/||0||node/21899",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.15",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1702349807",
"tags": [
"node/21899",
"drupal",
"rfc3164",
"block",
"https://library.witfoo.com",
"access denied",
"management_message"
],
"uri": "https://library.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "114.126.129.10"
} | Create a JSON artifact from the message |
<132>Dec 12 02:56:48 library4 drupal: https://library.wayne.com|1702349807|access denied|114.126.129.10|https://library.wayne.com/||0||node/21899 | Product: drupal
Vendor: drupal | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.