What's new

SIEM syslog analysis

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

JohnOCFII

Occasional Visitor
Greetings,

As is expected, if I log dropped connections, I see lots of them.

Any suggestions for a simple, free SIEM/log analyzer? Ideally something that would summarize thing and show, for example, "200 SSH attempts from IP address, a.b.c.d in China... or something like that.

Thanks,

John

Code:
Feb 23 15:02:00 kernel: DROP IN=eth0 OUT= MAC=1c:87:2c:4a:20:d0:2c:0b:e9:15:9c:22:08:00 SRC=71.6.216.53 DST=71.195.11.24 LEN=40 TOS=0x00 PREC=0x20 TTL=242 ID=54321 PROTO=TCP SPT=16992 DPT=16992 SEQ=1202533037 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0
Feb 23 15:02:07 kernel: DROP IN=eth0 OUT= MAC=1c:87:2c:4a:20:d0:2c:0b:e9:15:9c:22:08:00 SRC=50.7.78.226 DST=71.195.11.24 LEN=44 TOS=0x00 PREC=0x20 TTL=55 ID=22903 DF PROTO=UDP SPT=39435 DPT=27874 LEN=24
Feb 23 15:02:07 kernel: DROP IN=eth0 OUT= MAC=1c:87:2c:4a:20:d0:2c:0b:e9:15:9c:22:08:00 SRC=198.255.32.138 DST=71.195.11.24 LEN=44 TOS=0x00 PREC=0x20 TTL=56 ID=64422 DF PROTO=UDP SPT=54828 DPT=27874 LEN=24
Feb 23 15:02:07 kernel: DROP IN=eth0 OUT= MAC=1c:87:2c:4a:20:d0:2c:0b:e9:15:9c:22:08:00 SRC=198.255.30.194 DST=71.195.11.24 LEN=44 TOS=0x00 PREC=0x20 TTL=56 ID=5828 DF PROTO=UDP SPT=38984 DPT=27874 LEN=24
 
Greetings,

As is expected, if I log dropped connections, I see lots of them.

Any suggestions for a simple, free SIEM/log analyzer? Ideally something that would summarize thing and show, for example, "200 SSH attempts from IP address, a.b.c.d in China... or something like that.

Thanks,

John

Code:
Feb 23 15:02:00 kernel: DROP IN=eth0 OUT= MAC=1c:87:2c:4a:20:d0:2c:0b:e9:15:9c:22:08:00 SRC=71.6.216.53 DST=71.195.11.24 LEN=40 TOS=0x00 PREC=0x20 TTL=242 ID=54321 PROTO=TCP SPT=16992 DPT=16992 SEQ=1202533037 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0
Feb 23 15:02:07 kernel: DROP IN=eth0 OUT= MAC=1c:87:2c:4a:20:d0:2c:0b:e9:15:9c:22:08:00 SRC=50.7.78.226 DST=71.195.11.24 LEN=44 TOS=0x00 PREC=0x20 TTL=55 ID=22903 DF PROTO=UDP SPT=39435 DPT=27874 LEN=24
Feb 23 15:02:07 kernel: DROP IN=eth0 OUT= MAC=1c:87:2c:4a:20:d0:2c:0b:e9:15:9c:22:08:00 SRC=198.255.32.138 DST=71.195.11.24 LEN=44 TOS=0x00 PREC=0x20 TTL=56 ID=64422 DF PROTO=UDP SPT=54828 DPT=27874 LEN=24
Feb 23 15:02:07 kernel: DROP IN=eth0 OUT= MAC=1c:87:2c:4a:20:d0:2c:0b:e9:15:9c:22:08:00 SRC=198.255.30.194 DST=71.195.11.24 LEN=44 TOS=0x00 PREC=0x20 TTL=56 ID=5828 DF PROTO=UDP SPT=38984 DPT=27874 LEN=24
Skynet could get you close.
Search skynet and look for posts by @Adamm
 
There is always Splunk...not sure how much is built-in without a bit of work, but it for sure is a SIEM that has uber amounts of flexibility.
 
Curious to know is anyone running splunk/Home Monitor with Skynet 4? my Asus logs “Drop” which home monitor ingests with no problem but sky net uses [BLOCKED - INBOUND] and [BLOCKED - INVALID] which I have not been able to get to work yet. :( thoughts???
 

Similar threads

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top