instruction
stringclasses
1 value
input
stringlengths
537
4.51k
output
stringclasses
2 values
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:34.390+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 1, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:34.431+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 2, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:34.431+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 3, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:43.678+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 4, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:43.678+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 5, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:01:48.257+0000", "rule": { "level": 3, "description": "Host Unblocked by firewall-drop Active Response", "id": "652", "firedtimes": 1, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.096+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.096+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.346+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 1, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.359+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 2, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.596+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 3, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.608+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 4, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:50.341+0000", "rule": { "level": 5, "description": "Web server 400 error code.", "id": "31101", "firedtimes": 1, "mail": false, "groups": [ "web", "accesslog", "attack" ], "pci_dss": [ "6.5", "11.4" ], "gdpr": [ ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:50.342+0000", "rule": { "level": 5, "description": "Web server 400 error code.", "id": "31101", "firedtimes": 2, "mail": false, "groups": [ "web", "accesslog", "attack" ], "pci_dss": [ "6.5", "11.4" ], "gdpr": [ ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:50.362+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 5, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:50.480+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 6, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.303+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.302+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.573+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 7, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.586+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 8, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.797+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 9, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.809+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 10, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.359+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.359+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.636+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 11, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.650+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 12, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.847+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 13, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.859+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 14, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.368+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.369+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.647+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 15, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.661+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 16, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.854+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 17, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.866+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 18, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.434+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.434+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.714+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 19, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.728+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 20, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.914+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 21, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.926+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 22, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.472+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.472+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.755+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 23, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.768+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 24, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.946+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 25, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.959+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 26, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.499+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.499+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.778+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 27, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.792+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 28, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.971+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 29, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.983+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 30, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:38.775+0000", "rule": { "level": 3, "description": "Host Unblocked by firewall-drop Active Response", "id": "652", "firedtimes": 2, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:48.513+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:48.513+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:48.794+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 31, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:48.807+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 32, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:48.979+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 33, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:48.992+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 34, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:11:06.803+0000", "rule": { "level": 3, "description": "Host Unblocked by firewall-drop Active Response", "id": "652", "firedtimes": 3, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:11:32.556+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:11:32.556+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:11:32.838+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 35, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:11:32.852+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 36, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:11:33.022+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 37, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:11:33.035+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 38, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:06.599+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:06.599+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:06.871+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 39, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:06.884+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 40, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:07.053+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 41, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:07.066+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 42, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:32.627+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:32.627+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:32.898+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 43, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:32.913+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 44, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:33.078+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 45, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:33.091+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 46, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:52.305+0000", "rule": { "level": 5, "description": "Web server 400 error code.", "id": "31101", "firedtimes": 3, "mail": false, "groups": [ "web", "accesslog", "attack" ], "pci_dss": [ "6.5", "11.4" ], "gdpr": [ ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:12:52.919+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 47, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:16.672+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:16.672+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:16.960+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 48, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:16.975+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 49, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:17.122+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 50, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:17.134+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 51, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:21.119+0000", "rule": { "level": 5, "description": "Web server 400 error code.", "id": "31101", "firedtimes": 4, "mail": false, "groups": [ "web", "accesslog", "attack" ], "pci_dss": [ "6.5", "11.4" ], "gdpr": [ ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:22.962+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 52, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:34.690+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:34.690+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:34.975+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 53, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:34.989+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 54, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:35.139+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 55, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:35.152+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 56, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:58.711+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:59.003+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 57, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:13:59.163+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 58, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:14:40.752+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:14:40.752+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:14:41.045+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 59, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive