Definition
Canonical reference for fwprobe behavior.
Display name
Firewall/VPN Console Probing
How to read this signal
This annotator represents a behavioral pattern, not a claim of identity.
It’s designed to help you understand why certain traffic looks suspicious, automated,
probing, or exploit-oriented — and to support consistent reporting across the Syndu system.
Explanation
Flags requests that hit known firewall, VPN, and gateway management or login surfaces such as Fortinet remote-login paths, Palo Alto GlobalProtect portals, Cisco ASA/WebVPN prefixes, F5 TMUI routes, Pulse/Ivanti auth paths, and similar vendor-specific endpoints. It also emits on distinctive firewall/VPN client user agents, while generic keywords like "firewall" or "vpn" only count when combined with other hints such as 401/403 responses. This annotator is meant to surface informed attackers and scanners explicitly probing security-device consoles and portal surfaces, not generic payload injection. Interpret alongside scan velocity, Never-200-like behavior, and credential brute-force signals.