input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-27T17:18:59.797Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-27T17:19:00.608Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t205.166.220.211\n\tSource Port:\t\t56000\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"205.166.220.211","IpPort":"56000","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":14468}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6489634846,"task":"Logon"}}
|
{
"action": "Logon",
"clientport": 56000,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-10-27T17:18:59.797Z\",\"agent\":{\"ephemeral_id\":\"f1be155c-635c-4c98-be91-3a2982bce2ec\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-27T17:19:00.608Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t205.166.220.211\\n\\tSource Port:\\t\\t56000\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"205.166.220.211\",\"IpPort\":\"56000\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":14468}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6489634846,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6489634846",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "205.166.220.211",
"userName": "alice"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-27T17:18:59.797Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-27T17:19:00.608Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t205.166.220.211\n\tSource Port:\t\t56000\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"205.166.220.211","IpPort":"56000","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":14468}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6489634846,"task":"Logon"}}
|
Product: Windows Active Directory
Vendor: Microsoft
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-27T17:18:59.797Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-27T17:19:00.608Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t205.166.220.211\n\tSource Port:\t\t56000\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"205.166.220.211","IpPort":"56000","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":14468}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6489634846,"task":"Logon"}}
|
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 56000
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6489634846
streamName: microsoft-windows-security-auditing
clientIP: 205.166.220.211
userName: alice
|
Explain this syslog message
|
<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=40.176.204.96 dst=78.34.146.67 protocol=tcp sport=60260 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 60260,
"message": "<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=40.176.204.96 dst=78.34.146.67 protocol=tcp sport=60260 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "40.176.204.96",
"serverIP": "78.34.146.67"
}
|
Create a JSON artifact from the message
|
<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=40.176.204.96 dst=78.34.146.67 protocol=tcp sport=60260 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=40.176.204.96 dst=78.34.146.67 protocol=tcp sport=60260 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 60260
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 40.176.204.96
serverIP: 78.34.146.67
|
Explain this syslog message
|
<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=28.87.48.132 dst=168.175.63.83 protocol=tcp sport=60260 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 60260,
"message": "<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=28.87.48.132 dst=168.175.63.83 protocol=tcp sport=60260 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "28.87.48.132",
"serverIP": "168.175.63.83"
}
|
Create a JSON artifact from the message
|
<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=28.87.48.132 dst=168.175.63.83 protocol=tcp sport=60260 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=28.87.48.132 dst=168.175.63.83 protocol=tcp sport=60260 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 60260
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 28.87.48.132
serverIP: 168.175.63.83
|
Explain this syslog message
|
<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=20.155.173.67 dst=120.125.130.220 protocol=tcp sport=60260 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 60260,
"message": "<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=20.155.173.67 dst=120.125.130.220 protocol=tcp sport=60260 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "20.155.173.67",
"serverIP": "120.125.130.220"
}
|
Create a JSON artifact from the message
|
<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=20.155.173.67 dst=120.125.130.220 protocol=tcp sport=60260 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=20.155.173.67 dst=120.125.130.220 protocol=tcp sport=60260 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 60260
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 20.155.173.67
serverIP: 120.125.130.220
|
Explain this syslog message
|
<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=193.76.167.50 dst=112.156.184.135 protocol=tcp sport=60260 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 60260,
"message": "<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=193.76.167.50 dst=112.156.184.135 protocol=tcp sport=60260 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "193.76.167.50",
"serverIP": "112.156.184.135"
}
|
Create a JSON artifact from the message
|
<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=193.76.167.50 dst=112.156.184.135 protocol=tcp sport=60260 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=50.73.78.193 1 1687444914.047521091 M35_MX67C_MMIRagsdale l7_firewall src=193.76.167.50 dst=112.156.184.135 protocol=tcp sport=60260 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 60260
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 193.76.167.50
serverIP: 112.156.184.135
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=218.135.7.24 dst=16.177.17.45 protocol=tcp sport=58770 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 58770,
"message": "<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=218.135.7.24 dst=16.177.17.45 protocol=tcp sport=58770 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "218.135.7.24",
"serverIP": "16.177.17.45"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=218.135.7.24 dst=16.177.17.45 protocol=tcp sport=58770 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=218.135.7.24 dst=16.177.17.45 protocol=tcp sport=58770 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58770
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 218.135.7.24
serverIP: 16.177.17.45
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=209.134.129.62 dst=216.154.196.209 protocol=tcp sport=58770 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 58770,
"message": "<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=209.134.129.62 dst=216.154.196.209 protocol=tcp sport=58770 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "209.134.129.62",
"serverIP": "216.154.196.209"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=209.134.129.62 dst=216.154.196.209 protocol=tcp sport=58770 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=209.134.129.62 dst=216.154.196.209 protocol=tcp sport=58770 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58770
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 209.134.129.62
serverIP: 216.154.196.209
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=198.252.69.134 dst=5.140.117.198 protocol=tcp sport=58770 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 58770,
"message": "<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=198.252.69.134 dst=5.140.117.198 protocol=tcp sport=58770 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "198.252.69.134",
"serverIP": "5.140.117.198"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=198.252.69.134 dst=5.140.117.198 protocol=tcp sport=58770 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=198.252.69.134 dst=5.140.117.198 protocol=tcp sport=58770 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58770
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 198.252.69.134
serverIP: 5.140.117.198
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=105.145.220.226 dst=96.38.252.143 protocol=tcp sport=58770 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 58770,
"message": "<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=105.145.220.226 dst=96.38.252.143 protocol=tcp sport=58770 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "105.145.220.226",
"serverIP": "96.38.252.143"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=105.145.220.226 dst=96.38.252.143 protocol=tcp sport=58770 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1686895622.737494492 NORDC_MX400_1 l7_firewall src=105.145.220.226 dst=96.38.252.143 protocol=tcp sport=58770 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58770
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 105.145.220.226
serverIP: 96.38.252.143
|
Explain this syslog message
|
<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=203.65.120.123 dst=189.11.15.136 protocol=tcp sport=63131 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 63131,
"message": "<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=203.65.120.123 dst=189.11.15.136 protocol=tcp sport=63131 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "203.65.120.123",
"serverIP": "189.11.15.136"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=203.65.120.123 dst=189.11.15.136 protocol=tcp sport=63131 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=203.65.120.123 dst=189.11.15.136 protocol=tcp sport=63131 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 63131
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 203.65.120.123
serverIP: 189.11.15.136
|
Explain this syslog message
|
<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=111.136.113.103 dst=54.251.93.76 protocol=tcp sport=63131 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 63131,
"message": "<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=111.136.113.103 dst=54.251.93.76 protocol=tcp sport=63131 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "111.136.113.103",
"serverIP": "54.251.93.76"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=111.136.113.103 dst=54.251.93.76 protocol=tcp sport=63131 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=111.136.113.103 dst=54.251.93.76 protocol=tcp sport=63131 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 63131
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 111.136.113.103
serverIP: 54.251.93.76
|
Explain this syslog message
|
<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=87.158.250.126 dst=211.227.97.170 protocol=tcp sport=63131 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 63131,
"message": "<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=87.158.250.126 dst=211.227.97.170 protocol=tcp sport=63131 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "87.158.250.126",
"serverIP": "211.227.97.170"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=87.158.250.126 dst=211.227.97.170 protocol=tcp sport=63131 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=87.158.250.126 dst=211.227.97.170 protocol=tcp sport=63131 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 63131
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 87.158.250.126
serverIP: 211.227.97.170
|
Explain this syslog message
|
<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=114.155.17.220 dst=83.7.239.203 protocol=tcp sport=63131 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 63131,
"message": "<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=114.155.17.220 dst=83.7.239.203 protocol=tcp sport=63131 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "114.155.17.220",
"serverIP": "83.7.239.203"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=114.155.17.220 dst=83.7.239.203 protocol=tcp sport=63131 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.67.227.85 1 1686742873.660045716 M24_MX67C_ForestPark l7_firewall src=114.155.17.220 dst=83.7.239.203 protocol=tcp sport=63131 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 63131
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 114.155.17.220
serverIP: 83.7.239.203
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=233.234.243.140 dst=55.209.205.14 protocol=tcp sport=54345 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=233.234.243.140 dst=55.209.205.14 protocol=tcp sport=54345 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54345,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "233.234.243.140",
"serverIP": "55.209.205.14"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=233.234.243.140 dst=55.209.205.14 protocol=tcp sport=54345 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=233.234.243.140 dst=55.209.205.14 protocol=tcp sport=54345 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54345
protocol: 6
streamName: meraki_l7_firewall
clientIP: 233.234.243.140
serverIP: 55.209.205.14
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=4.236.128.71 dst=7.36.200.158 protocol=tcp sport=54345 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=4.236.128.71 dst=7.36.200.158 protocol=tcp sport=54345 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54345,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "4.236.128.71",
"serverIP": "7.36.200.158"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=4.236.128.71 dst=7.36.200.158 protocol=tcp sport=54345 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=4.236.128.71 dst=7.36.200.158 protocol=tcp sport=54345 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54345
protocol: 6
streamName: meraki_l7_firewall
clientIP: 4.236.128.71
serverIP: 7.36.200.158
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=92.60.136.178 dst=204.186.207.33 protocol=tcp sport=54345 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=92.60.136.178 dst=204.186.207.33 protocol=tcp sport=54345 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54345,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "92.60.136.178",
"serverIP": "204.186.207.33"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=92.60.136.178 dst=204.186.207.33 protocol=tcp sport=54345 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=92.60.136.178 dst=204.186.207.33 protocol=tcp sport=54345 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54345
protocol: 6
streamName: meraki_l7_firewall
clientIP: 92.60.136.178
serverIP: 204.186.207.33
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=234.12.27.163 dst=170.82.238.87 protocol=tcp sport=54345 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=234.12.27.163 dst=170.82.238.87 protocol=tcp sport=54345 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54345,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "234.12.27.163",
"serverIP": "170.82.238.87"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=234.12.27.163 dst=170.82.238.87 protocol=tcp sport=54345 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1659255430.823430223 M61_MX67C_Savannah l7_firewall src=234.12.27.163 dst=170.82.238.87 protocol=tcp sport=54345 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54345
protocol: 6
streamName: meraki_l7_firewall
clientIP: 234.12.27.163
serverIP: 170.82.238.87
|
Explain this syslog message
|
<185>Sep 4 02:32:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=228.213.44.252 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=63.68.23.148 spt=61344 requestMethod=GET app=HTTP requestContext="-" start=Sep 04 2023 02:32:37 rt=1693812757638 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=18a5f1b9486-e2c4bb41 cn2=61344 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.68.23.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 61344,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1693812757638 ",
"message": "<185>Sep 4 02:32:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=228.213.44.252 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=63.68.23.148 spt=61344 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 04 2023 02:32:37 rt=1693812757638 request=/ requestClientApplication=\"Mozilla/5.0\" dvchost=WAFirewall externalId=18a5f1b9486-e2c4bb41 cn2=61344 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.68.23.148 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:193.106.29.122",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "63.68.23.148",
"serverIP": "228.213.44.252",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 4 02:32:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=228.213.44.252 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=63.68.23.148 spt=61344 requestMethod=GET app=HTTP requestContext="-" start=Sep 04 2023 02:32:37 rt=1693812757638 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=18a5f1b9486-e2c4bb41 cn2=61344 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.68.23.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 4 02:32:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=228.213.44.252 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=63.68.23.148 spt=61344 requestMethod=GET app=HTTP requestContext="-" start=Sep 04 2023 02:32:37 rt=1693812757638 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=18a5f1b9486-e2c4bb41 cn2=61344 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=63.68.23.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 61344
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1693812757638
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:193.106.29.122', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 63.68.23.148
serverIP: 228.213.44.252
userName: -
|
Explain this syslog message
|
<185>Sep 4 02:32:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=16.255.242.46 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.172.169.118 spt=61344 requestMethod=GET app=HTTP requestContext="-" start=Sep 04 2023 02:32:37 rt=1693812757638 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=18a5f1b9486-e2c4bb41 cn2=61344 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.172.169.118 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 61344,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1693812757638 ",
"message": "<185>Sep 4 02:32:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=16.255.242.46 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=158.172.169.118 spt=61344 requestMethod=GET app=HTTP requestContext=\"-\" start=Sep 04 2023 02:32:37 rt=1693812757638 request=/ requestClientApplication=\"Mozilla/5.0\" dvchost=WAFirewall externalId=18a5f1b9486-e2c4bb41 cn2=61344 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.172.169.118 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:193.106.29.122",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "158.172.169.118",
"serverIP": "16.255.242.46",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 4 02:32:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=16.255.242.46 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.172.169.118 spt=61344 requestMethod=GET app=HTTP requestContext="-" start=Sep 04 2023 02:32:37 rt=1693812757638 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=18a5f1b9486-e2c4bb41 cn2=61344 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.172.169.118 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 4 02:32:37 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=16.255.242.46 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=158.172.169.118 spt=61344 requestMethod=GET app=HTTP requestContext="-" start=Sep 04 2023 02:32:37 rt=1693812757638 request=/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=18a5f1b9486-e2c4bb41 cn2=61344 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=158.172.169.118 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 61344
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1693812757638
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:193.106.29.122', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 158.172.169.118
serverIP: 16.255.242.46
userName: -
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"162.203.156.101","externalIp":"204.217.60.162","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=162.203.156.101 ::: serverIP=204.217.60.162 ::: userName=alice ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-27T11:29:33.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={\"originId\":410613940,\"originType\":\"AD Users\",\"internalIp\":\"162.203.156.101\",\"externalIp\":\"204.217.60.162\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"plankjock.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-27T11:29:33.000Z\"} ::: clientIP=162.203.156.101 ::: serverIP=204.217.60.162 ::: userName=alice ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plankjock.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plankjock.com",
"vendorcode": "AdvertisementsPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "162.203.156.101",
"serverIP": "204.217.60.162",
"userName": "alice"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"162.203.156.101","externalIp":"204.217.60.162","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=162.203.156.101 ::: serverIP=204.217.60.162 ::: userName=alice ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"162.203.156.101","externalIp":"204.217.60.162","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=162.203.156.101 ::: serverIP=204.217.60.162 ::: userName=alice ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-27T11:29:33.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plankjock.com
messagetype: firewall_action
severitycode: 2
fqdn: plankjock.com
vendorcode: AdvertisementsPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 162.203.156.101
serverIP: 204.217.60.162
userName: alice
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"143.164.94.167","externalIp":"96.36.65.96","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=143.164.94.167 ::: serverIP=96.36.65.96 ::: userName=nighthawk ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-27T11:29:33.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={\"originId\":410613940,\"originType\":\"AD Users\",\"internalIp\":\"143.164.94.167\",\"externalIp\":\"96.36.65.96\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"plankjock.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-27T11:29:33.000Z\"} ::: clientIP=143.164.94.167 ::: serverIP=96.36.65.96 ::: userName=nighthawk ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plankjock.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plankjock.com",
"vendorcode": "AdvertisementsPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "143.164.94.167",
"serverIP": "96.36.65.96",
"userName": "nighthawk"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"143.164.94.167","externalIp":"96.36.65.96","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=143.164.94.167 ::: serverIP=96.36.65.96 ::: userName=nighthawk ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"143.164.94.167","externalIp":"96.36.65.96","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=143.164.94.167 ::: serverIP=96.36.65.96 ::: userName=nighthawk ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-27T11:29:33.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plankjock.com
messagetype: firewall_action
severitycode: 2
fqdn: plankjock.com
vendorcode: AdvertisementsPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 143.164.94.167
serverIP: 96.36.65.96
userName: nighthawk
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"90.194.21.10","externalIp":"249.187.134.138","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=90.194.21.10 ::: serverIP=249.187.134.138 ::: userName=charlie ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-27T11:29:33.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={\"originId\":410613940,\"originType\":\"AD Users\",\"internalIp\":\"90.194.21.10\",\"externalIp\":\"249.187.134.138\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"plankjock.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-27T11:29:33.000Z\"} ::: clientIP=90.194.21.10 ::: serverIP=249.187.134.138 ::: userName=charlie ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plankjock.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plankjock.com",
"vendorcode": "AdvertisementsPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "90.194.21.10",
"serverIP": "249.187.134.138",
"userName": "charlie"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"90.194.21.10","externalIp":"249.187.134.138","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=90.194.21.10 ::: serverIP=249.187.134.138 ::: userName=charlie ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"90.194.21.10","externalIp":"249.187.134.138","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=90.194.21.10 ::: serverIP=249.187.134.138 ::: userName=charlie ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-27T11:29:33.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plankjock.com
messagetype: firewall_action
severitycode: 2
fqdn: plankjock.com
vendorcode: AdvertisementsPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 90.194.21.10
serverIP: 249.187.134.138
userName: charlie
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"3.181.216.118","externalIp":"57.102.193.254","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=3.181.216.118 ::: serverIP=57.102.193.254 ::: userName=janedoe ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-27T11:29:33.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={\"originId\":410613940,\"originType\":\"AD Users\",\"internalIp\":\"3.181.216.118\",\"externalIp\":\"57.102.193.254\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"plankjock.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-27T11:29:33.000Z\"} ::: clientIP=3.181.216.118 ::: serverIP=57.102.193.254 ::: userName=janedoe ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plankjock.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plankjock.com",
"vendorcode": "AdvertisementsPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "3.181.216.118",
"serverIP": "57.102.193.254",
"userName": "janedoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"3.181.216.118","externalIp":"57.102.193.254","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=3.181.216.118 ::: serverIP=57.102.193.254 ::: userName=janedoe ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"3.181.216.118","externalIp":"57.102.193.254","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=3.181.216.118 ::: serverIP=57.102.193.254 ::: userName=janedoe ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-27T11:29:33.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plankjock.com
messagetype: firewall_action
severitycode: 2
fqdn: plankjock.com
vendorcode: AdvertisementsPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 3.181.216.118
serverIP: 57.102.193.254
userName: janedoe
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"121.240.212.90","externalIp":"25.87.131.189","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=121.240.212.90 ::: serverIP=25.87.131.189 ::: userName=johndoe ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-27T11:29:33.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={\"originId\":410613940,\"originType\":\"AD Users\",\"internalIp\":\"121.240.212.90\",\"externalIp\":\"25.87.131.189\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"plankjock.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-27T11:29:33.000Z\"} ::: clientIP=121.240.212.90 ::: serverIP=25.87.131.189 ::: userName=johndoe ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plankjock.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plankjock.com",
"vendorcode": "AdvertisementsPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "121.240.212.90",
"serverIP": "25.87.131.189",
"userName": "johndoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"121.240.212.90","externalIp":"25.87.131.189","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=121.240.212.90 ::: serverIP=25.87.131.189 ::: userName=johndoe ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"121.240.212.90","externalIp":"25.87.131.189","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=121.240.212.90 ::: serverIP=25.87.131.189 ::: userName=johndoe ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-27T11:29:33.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plankjock.com
messagetype: firewall_action
severitycode: 2
fqdn: plankjock.com
vendorcode: AdvertisementsPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 121.240.212.90
serverIP: 25.87.131.189
userName: johndoe
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"24.206.156.230","externalIp":"33.161.79.93","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=24.206.156.230 ::: serverIP=33.161.79.93 ::: userName=janedoe ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-27T11:29:33.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={\"originId\":410613940,\"originType\":\"AD Users\",\"internalIp\":\"24.206.156.230\",\"externalIp\":\"33.161.79.93\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"plankjock.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-27T11:29:33.000Z\"} ::: clientIP=24.206.156.230 ::: serverIP=33.161.79.93 ::: userName=janedoe ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plankjock.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plankjock.com",
"vendorcode": "AdvertisementsPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "24.206.156.230",
"serverIP": "33.161.79.93",
"userName": "janedoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"24.206.156.230","externalIp":"33.161.79.93","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=24.206.156.230 ::: serverIP=33.161.79.93 ::: userName=janedoe ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=plankjock.com ::: action=BLOCKED ::: message={"originId":410613940,"originType":"AD Users","internalIp":"24.206.156.230","externalIp":"33.161.79.93","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"plankjock.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-09-27T11:29:33.000Z"} ::: clientIP=24.206.156.230 ::: serverIP=33.161.79.93 ::: userName=janedoe ::: created_at=2022-09-27T11:29:33.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-27T11:29:33.000Z ::: serverHostname=plankjock.com ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-27T11:29:33.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plankjock.com
messagetype: firewall_action
severitycode: 2
fqdn: plankjock.com
vendorcode: AdvertisementsPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 24.206.156.230
serverIP: 33.161.79.93
userName: janedoe
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"47.214.36.39","externalIp":"198.139.144.139","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=47.214.36.39 ::: serverIP=198.139.144.139 ::: userName=bob ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T23:10:27.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"47.214.36.39\",\"externalIp\":\"198.139.144.139\",\"categories\":[\"Phishing\",\"Society and Culture\"],\"tags\":[],\"destination\":\"happytester.xyz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T23:10:27.000Z\"} ::: clientIP=47.214.36.39 ::: serverIP=198.139.144.139 ::: userName=bob ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "happytester.xyz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "happytester.xyz",
"vendorcode": "PhishingSociety and Culture",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "47.214.36.39",
"serverIP": "198.139.144.139",
"userName": "bob"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"47.214.36.39","externalIp":"198.139.144.139","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=47.214.36.39 ::: serverIP=198.139.144.139 ::: userName=bob ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"47.214.36.39","externalIp":"198.139.144.139","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=47.214.36.39 ::: serverIP=198.139.144.139 ::: userName=bob ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T23:10:27.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: happytester.xyz
messagetype: firewall_action
severitycode: 2
fqdn: happytester.xyz
vendorcode: PhishingSociety and Culture
action: block
streamName: OpenDNS Detection
clientIP: 47.214.36.39
serverIP: 198.139.144.139
userName: bob
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"223.75.51.174","externalIp":"33.243.122.85","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=223.75.51.174 ::: serverIP=33.243.122.85 ::: userName=johndoe ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T23:10:27.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"223.75.51.174\",\"externalIp\":\"33.243.122.85\",\"categories\":[\"Phishing\",\"Society and Culture\"],\"tags\":[],\"destination\":\"happytester.xyz\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T23:10:27.000Z\"} ::: clientIP=223.75.51.174 ::: serverIP=33.243.122.85 ::: userName=johndoe ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "happytester.xyz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "happytester.xyz",
"vendorcode": "PhishingSociety and Culture",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "223.75.51.174",
"serverIP": "33.243.122.85",
"userName": "johndoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"223.75.51.174","externalIp":"33.243.122.85","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=223.75.51.174 ::: serverIP=33.243.122.85 ::: userName=johndoe ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"223.75.51.174","externalIp":"33.243.122.85","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=223.75.51.174 ::: serverIP=33.243.122.85 ::: userName=johndoe ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T23:10:27.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: happytester.xyz
messagetype: firewall_action
severitycode: 2
fqdn: happytester.xyz
vendorcode: PhishingSociety and Culture
action: block
streamName: OpenDNS Detection
clientIP: 223.75.51.174
serverIP: 33.243.122.85
userName: johndoe
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"48.21.205.128","externalIp":"204.34.117.79","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=48.21.205.128 ::: serverIP=204.34.117.79 ::: userName=johndoe ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T23:10:27.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"48.21.205.128\",\"externalIp\":\"204.34.117.79\",\"categories\":[\"Phishing\",\"Society and Culture\"],\"tags\":[],\"destination\":\"happytester.xyz\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T23:10:27.000Z\"} ::: clientIP=48.21.205.128 ::: serverIP=204.34.117.79 ::: userName=johndoe ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "happytester.xyz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "happytester.xyz",
"vendorcode": "PhishingSociety and Culture",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "48.21.205.128",
"serverIP": "204.34.117.79",
"userName": "johndoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"48.21.205.128","externalIp":"204.34.117.79","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=48.21.205.128 ::: serverIP=204.34.117.79 ::: userName=johndoe ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"48.21.205.128","externalIp":"204.34.117.79","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=48.21.205.128 ::: serverIP=204.34.117.79 ::: userName=johndoe ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T23:10:27.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: happytester.xyz
messagetype: firewall_action
severitycode: 2
fqdn: happytester.xyz
vendorcode: PhishingSociety and Culture
action: block
streamName: OpenDNS Detection
clientIP: 48.21.205.128
serverIP: 204.34.117.79
userName: johndoe
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"206.66.30.149","externalIp":"249.187.147.104","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=206.66.30.149 ::: serverIP=249.187.147.104 ::: userName=fish ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T23:10:27.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"206.66.30.149\",\"externalIp\":\"249.187.147.104\",\"categories\":[\"Phishing\",\"Society and Culture\"],\"tags\":[],\"destination\":\"happytester.xyz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T23:10:27.000Z\"} ::: clientIP=206.66.30.149 ::: serverIP=249.187.147.104 ::: userName=fish ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "happytester.xyz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "happytester.xyz",
"vendorcode": "PhishingSociety and Culture",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "206.66.30.149",
"serverIP": "249.187.147.104",
"userName": "fish"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"206.66.30.149","externalIp":"249.187.147.104","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=206.66.30.149 ::: serverIP=249.187.147.104 ::: userName=fish ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"206.66.30.149","externalIp":"249.187.147.104","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=206.66.30.149 ::: serverIP=249.187.147.104 ::: userName=fish ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T23:10:27.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: happytester.xyz
messagetype: firewall_action
severitycode: 2
fqdn: happytester.xyz
vendorcode: PhishingSociety and Culture
action: block
streamName: OpenDNS Detection
clientIP: 206.66.30.149
serverIP: 249.187.147.104
userName: fish
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"52.13.60.80","externalIp":"177.40.150.199","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=52.13.60.80 ::: serverIP=177.40.150.199 ::: userName=alice ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T23:10:27.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"52.13.60.80\",\"externalIp\":\"177.40.150.199\",\"categories\":[\"Phishing\",\"Society and Culture\"],\"tags\":[],\"destination\":\"happytester.xyz\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T23:10:27.000Z\"} ::: clientIP=52.13.60.80 ::: serverIP=177.40.150.199 ::: userName=alice ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "happytester.xyz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "happytester.xyz",
"vendorcode": "PhishingSociety and Culture",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "52.13.60.80",
"serverIP": "177.40.150.199",
"userName": "alice"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"52.13.60.80","externalIp":"177.40.150.199","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=52.13.60.80 ::: serverIP=177.40.150.199 ::: userName=alice ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"52.13.60.80","externalIp":"177.40.150.199","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=52.13.60.80 ::: serverIP=177.40.150.199 ::: userName=alice ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T23:10:27.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: happytester.xyz
messagetype: firewall_action
severitycode: 2
fqdn: happytester.xyz
vendorcode: PhishingSociety and Culture
action: block
streamName: OpenDNS Detection
clientIP: 52.13.60.80
serverIP: 177.40.150.199
userName: alice
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"32.10.20.60","externalIp":"60.239.201.34","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=32.10.20.60 ::: serverIP=60.239.201.34 ::: userName=bob ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T23:10:27.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"32.10.20.60\",\"externalIp\":\"60.239.201.34\",\"categories\":[\"Phishing\",\"Society and Culture\"],\"tags\":[],\"destination\":\"happytester.xyz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T23:10:27.000Z\"} ::: clientIP=32.10.20.60 ::: serverIP=60.239.201.34 ::: userName=bob ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "happytester.xyz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "happytester.xyz",
"vendorcode": "PhishingSociety and Culture",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "32.10.20.60",
"serverIP": "60.239.201.34",
"userName": "bob"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"32.10.20.60","externalIp":"60.239.201.34","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=32.10.20.60 ::: serverIP=60.239.201.34 ::: userName=bob ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=happytester.xyz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"32.10.20.60","externalIp":"60.239.201.34","categories":["Phishing","Society and Culture"],"tags":[],"destination":"happytester.xyz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T23:10:27.000Z"} ::: clientIP=32.10.20.60 ::: serverIP=60.239.201.34 ::: userName=bob ::: created_at=2022-08-04T23:10:27.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingSociety and Culture ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T23:10:27.000Z ::: serverHostname=happytester.xyz ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T23:10:27.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: happytester.xyz
messagetype: firewall_action
severitycode: 2
fqdn: happytester.xyz
vendorcode: PhishingSociety and Culture
action: block
streamName: OpenDNS Detection
clientIP: 32.10.20.60
serverIP: 60.239.201.34
userName: bob
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=167.49.224.91 ::: message={"access_device":{"epkey":"EPQ9H9OE7T5HTLBATRX8","hostname":null,"ip":"167.49.224.91","location":{"city":"Canton","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"167.49.224.91","key":"DPTIGVJ7TGNIMXPJM0GY","location":{"city":"Canton","country":"United States","state":"Georgia"},"name":"678-984-7259"},"email":"nighthawk@umbrellautilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-20T14:13:26.364112+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676902406,"txid":"c3c8d311-beb2-4f3a-8cbc-33abd7b71eeb","user":{"groups":[],"key":"DU53XMH4GKEFQB4ULO2F","name":"nighthawk"}} ::: clientIP=167.49.224.91 ::: userName=nighthawk ::: created_at=1676902406 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676902406 ::: clientHostname=678-984-7259 ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1676902406",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "73.184.173.97",
"sensitivity": "normal",
"application": "LastPass",
"messagetype": "credential_access",
"clienthostname": "678-984-7259",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=167.49.224.91 ::: message={\"access_device\":{\"epkey\":\"EPQ9H9OE7T5HTLBATRX8\",\"hostname\":null,\"ip\":\"167.49.224.91\",\"location\":{\"city\":\"Canton\",\"country\":\"United States\",\"state\":\"Georgia\"}},\"alias\":\"\",\"application\":{\"key\":\"DI5NR1TYEZ6N0Y46F8AN\",\"name\":\"LastPass\"},\"auth_device\":{\"ip\":\"167.49.224.91\",\"key\":\"DPTIGVJ7TGNIMXPJM0GY\",\"location\":{\"city\":\"Canton\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-984-7259\"},\"email\":\"nighthawk@umbrellautilities.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-20T14:13:26.364112+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1676902406,\"txid\":\"c3c8d311-beb2-4f3a-8cbc-33abd7b71eeb\",\"user\":{\"groups\":[],\"key\":\"DU53XMH4GKEFQB4ULO2F\",\"name\":\"nighthawk\"}} ::: clientIP=167.49.224.91 ::: userName=nighthawk ::: created_at=1676902406 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676902406 ::: clientHostname=678-984-7259 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "167.49.224.91",
"userName": "nighthawk"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=167.49.224.91 ::: message={"access_device":{"epkey":"EPQ9H9OE7T5HTLBATRX8","hostname":null,"ip":"167.49.224.91","location":{"city":"Canton","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"167.49.224.91","key":"DPTIGVJ7TGNIMXPJM0GY","location":{"city":"Canton","country":"United States","state":"Georgia"},"name":"678-984-7259"},"email":"nighthawk@umbrellautilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-20T14:13:26.364112+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676902406,"txid":"c3c8d311-beb2-4f3a-8cbc-33abd7b71eeb","user":{"groups":[],"key":"DU53XMH4GKEFQB4ULO2F","name":"nighthawk"}} ::: clientIP=167.49.224.91 ::: userName=nighthawk ::: created_at=1676902406 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676902406 ::: clientHostname=678-984-7259 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=167.49.224.91 ::: message={"access_device":{"epkey":"EPQ9H9OE7T5HTLBATRX8","hostname":null,"ip":"167.49.224.91","location":{"city":"Canton","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"167.49.224.91","key":"DPTIGVJ7TGNIMXPJM0GY","location":{"city":"Canton","country":"United States","state":"Georgia"},"name":"678-984-7259"},"email":"nighthawk@umbrellautilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-20T14:13:26.364112+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676902406,"txid":"c3c8d311-beb2-4f3a-8cbc-33abd7b71eeb","user":{"groups":[],"key":"DU53XMH4GKEFQB4ULO2F","name":"nighthawk"}} ::: clientIP=167.49.224.91 ::: userName=nighthawk ::: created_at=1676902406 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676902406 ::: clientHostname=678-984-7259 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 1676902406
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 73.184.173.97
sensitivity: normal
application: LastPass
messagetype: credential_access
clienthostname: 678-984-7259
streamName: DUO
clientIP: 167.49.224.91
userName: nighthawk
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=14.93.111.172 ::: message={"access_device":{"epkey":"EPQ9H9OE7T5HTLBATRX8","hostname":null,"ip":"14.93.111.172","location":{"city":"Canton","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"14.93.111.172","key":"DPTIGVJ7TGNIMXPJM0GY","location":{"city":"Canton","country":"United States","state":"Georgia"},"name":"678-984-7259"},"email":"alice@oscorputilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-20T14:13:26.364112+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676902406,"txid":"c3c8d311-beb2-4f3a-8cbc-33abd7b71eeb","user":{"groups":[],"key":"DU53XMH4GKEFQB4ULO2F","name":"alice"}} ::: clientIP=14.93.111.172 ::: userName=alice ::: created_at=1676902406 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676902406 ::: clientHostname=678-984-7259 ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1676902406",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "73.184.173.97",
"sensitivity": "normal",
"application": "LastPass",
"messagetype": "credential_access",
"clienthostname": "678-984-7259",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=14.93.111.172 ::: message={\"access_device\":{\"epkey\":\"EPQ9H9OE7T5HTLBATRX8\",\"hostname\":null,\"ip\":\"14.93.111.172\",\"location\":{\"city\":\"Canton\",\"country\":\"United States\",\"state\":\"Georgia\"}},\"alias\":\"\",\"application\":{\"key\":\"DI5NR1TYEZ6N0Y46F8AN\",\"name\":\"LastPass\"},\"auth_device\":{\"ip\":\"14.93.111.172\",\"key\":\"DPTIGVJ7TGNIMXPJM0GY\",\"location\":{\"city\":\"Canton\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-984-7259\"},\"email\":\"alice@oscorputilities.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-20T14:13:26.364112+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1676902406,\"txid\":\"c3c8d311-beb2-4f3a-8cbc-33abd7b71eeb\",\"user\":{\"groups\":[],\"key\":\"DU53XMH4GKEFQB4ULO2F\",\"name\":\"alice\"}} ::: clientIP=14.93.111.172 ::: userName=alice ::: created_at=1676902406 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676902406 ::: clientHostname=678-984-7259 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "14.93.111.172",
"userName": "alice"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=14.93.111.172 ::: message={"access_device":{"epkey":"EPQ9H9OE7T5HTLBATRX8","hostname":null,"ip":"14.93.111.172","location":{"city":"Canton","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"14.93.111.172","key":"DPTIGVJ7TGNIMXPJM0GY","location":{"city":"Canton","country":"United States","state":"Georgia"},"name":"678-984-7259"},"email":"alice@oscorputilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-20T14:13:26.364112+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676902406,"txid":"c3c8d311-beb2-4f3a-8cbc-33abd7b71eeb","user":{"groups":[],"key":"DU53XMH4GKEFQB4ULO2F","name":"alice"}} ::: clientIP=14.93.111.172 ::: userName=alice ::: created_at=1676902406 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676902406 ::: clientHostname=678-984-7259 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=14.93.111.172 ::: message={"access_device":{"epkey":"EPQ9H9OE7T5HTLBATRX8","hostname":null,"ip":"14.93.111.172","location":{"city":"Canton","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"14.93.111.172","key":"DPTIGVJ7TGNIMXPJM0GY","location":{"city":"Canton","country":"United States","state":"Georgia"},"name":"678-984-7259"},"email":"alice@oscorputilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-20T14:13:26.364112+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676902406,"txid":"c3c8d311-beb2-4f3a-8cbc-33abd7b71eeb","user":{"groups":[],"key":"DU53XMH4GKEFQB4ULO2F","name":"alice"}} ::: clientIP=14.93.111.172 ::: userName=alice ::: created_at=1676902406 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676902406 ::: clientHostname=678-984-7259 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 1676902406
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 73.184.173.97
sensitivity: normal
application: LastPass
messagetype: credential_access
clienthostname: 678-984-7259
streamName: DUO
clientIP: 14.93.111.172
userName: alice
|
Explain this syslog message
|
<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=77.112.14.171 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=33.111.249.169 spt=48472 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.111.249.169 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:173.252.95.7",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Oct 23 17:55:20 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=77.112.14.171 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=33.111.249.169 spt=48472 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Oct 23 2022 17:55:20 rt=1666565720730 request=/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=184070eca9a-acc034be cn2=48472 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=33.111.249.169 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1666565720730 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/servlet/eAndar.WebFileLibrary/36/3437323731/uw-horz-logo.png",
"clientport": 48472,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "33.111.249.169",
"serverIP": "77.112.14.171",
"userName": "-"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.