instruction stringclasses 1
value | input stringlengths 537 4.51k | output stringclasses 2
values |
|---|---|---|
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:34.390+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 1,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:34.431+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 2,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:34.431+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 3,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:43.678+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 4,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:43.678+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 5,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:01:48.257+0000",
"rule": {
"level": 3,
"description": "Host Unblocked by firewall-drop Active Response",
"id": "652",
"firedtimes": 1,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.346+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 1,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.359+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 2,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.596+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 3,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.608+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 4,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.341+0000",
"rule": {
"level": 5,
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": 1,
"mail": false,
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.342+0000",
"rule": {
"level": 5,
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": 2,
"mail": false,
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.362+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 5,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.480+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 6,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.303+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.302+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.573+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 7,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.586+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 8,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.797+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 9,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.809+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 10,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.636+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 11,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.650+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 12,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.847+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 13,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.859+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 14,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.368+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.369+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.647+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 15,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.661+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 16,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.854+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 17,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.866+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 18,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.714+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 19,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.728+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 20,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.914+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 21,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.926+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 22,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.755+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 23,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.768+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 24,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.946+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 25,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.959+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 26,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.778+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 27,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.792+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 28,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.971+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 29,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.983+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 30,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:38.775+0000",
"rule": {
"level": 3,
"description": "Host Unblocked by firewall-drop Active Response",
"id": "652",
"firedtimes": 2,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:48.513+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:48.513+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:48.794+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 31,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:48.807+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 32,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:48.979+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 33,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:48.992+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 34,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:06.803+0000",
"rule": {
"level": 3,
"description": "Host Unblocked by firewall-drop Active Response",
"id": "652",
"firedtimes": 3,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:32.556+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:32.556+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:32.838+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 35,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:32.852+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 36,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:33.022+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 37,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:11:33.035+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 38,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:06.599+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:06.599+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:06.871+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 39,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:06.884+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 40,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:07.053+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 41,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:07.066+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 42,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:32.627+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:32.627+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:32.898+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 43,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:32.913+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 44,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:33.078+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 45,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:33.091+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 46,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:52.305+0000",
"rule": {
"level": 5,
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": 3,
"mail": false,
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:12:52.919+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 47,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:16.672+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:16.672+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:16.960+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 48,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:16.975+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 49,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:17.122+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 50,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:17.134+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 51,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:21.119+0000",
"rule": {
"level": 5,
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": 4,
"mail": false,
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:22.962+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 52,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:34.690+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:34.690+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:34.975+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 53,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:34.989+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 54,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:35.139+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 55,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:35.152+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 56,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:58.711+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:59.003+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 57,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:13:59.163+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 58,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:14:40.752+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:14:40.752+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:14:41.045+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 59,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.