input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=152.146.3.69 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=53.46.192.8 spt=50336 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372311 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2762.73 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e79-dd994017 cn2=50336 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=53.46.192.8 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 50336
facilitycode: 23
facilitylabel: local7
fqdn: /owa/auth/logon.aspx
localhostname: WAFirewall
localstarttime: 1694073372311
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:185.232.67.7', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 53.46.192.8
serverIP: 152.146.3.69
userName: - | Explain this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.58.254.204 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.155.231.62 spt=58424 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372332 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43eac-dc9d363a cn2=58424 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.155.231.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 58424,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/owa/auth/logon.aspx",
"localhostname": "WAFirewall",
"localstarttime": "1694073372332 ",
"message": "<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.58.254.204 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=40.155.231.62 spt=58424 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 02:56:12 rt=1694073372332 request=/owa/auth/logon.aspx requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36\" dvchost=WAFirewall externalId=18a6ea43eac-dc9d363a cn2=58424 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.155.231.62 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:185.232.67.7",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "40.155.231.62",
"serverIP": "233.58.254.204",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.58.254.204 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.155.231.62 spt=58424 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372332 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43eac-dc9d363a cn2=58424 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.155.231.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=233.58.254.204 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=40.155.231.62 spt=58424 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372332 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43eac-dc9d363a cn2=58424 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=40.155.231.62 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 58424
facilitycode: 23
facilitylabel: local7
fqdn: /owa/auth/logon.aspx
localhostname: WAFirewall
localstarttime: 1694073372332
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:185.232.67.7', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 40.155.231.62
serverIP: 233.58.254.204
userName: - | Explain this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=3.187.19.86 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=162.85.7.1 spt=58424 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372332 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43eac-dc9d363a cn2=58424 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=162.85.7.1 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 58424,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/owa/auth/logon.aspx",
"localhostname": "WAFirewall",
"localstarttime": "1694073372332 ",
"message": "<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=3.187.19.86 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=162.85.7.1 spt=58424 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 02:56:12 rt=1694073372332 request=/owa/auth/logon.aspx requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36\" dvchost=WAFirewall externalId=18a6ea43eac-dc9d363a cn2=58424 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=162.85.7.1 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:185.232.67.7",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "162.85.7.1",
"serverIP": "3.187.19.86",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=3.187.19.86 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=162.85.7.1 spt=58424 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372332 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43eac-dc9d363a cn2=58424 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=162.85.7.1 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=3.187.19.86 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=162.85.7.1 spt=58424 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372332 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43eac-dc9d363a cn2=58424 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=162.85.7.1 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 58424
facilitycode: 23
facilitylabel: local7
fqdn: /owa/auth/logon.aspx
localhostname: WAFirewall
localstarttime: 1694073372332
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:185.232.67.7', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 162.85.7.1
serverIP: 3.187.19.86
userName: - | Explain this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=66.121.116.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=237.161.165.187 spt=58424 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372332 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43eac-dc9d363a cn2=58424 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.161.165.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 58424,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/owa/auth/logon.aspx",
"localhostname": "WAFirewall",
"localstarttime": "1694073372332 ",
"message": "<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=66.121.116.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=237.161.165.187 spt=58424 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 02:56:12 rt=1694073372332 request=/owa/auth/logon.aspx requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36\" dvchost=WAFirewall externalId=18a6ea43eac-dc9d363a cn2=58424 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.161.165.187 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:185.232.67.7",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "237.161.165.187",
"serverIP": "66.121.116.73",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=66.121.116.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=237.161.165.187 spt=58424 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372332 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43eac-dc9d363a cn2=58424 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.161.165.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=66.121.116.73 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=237.161.165.187 spt=58424 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372332 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43eac-dc9d363a cn2=58424 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=237.161.165.187 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 58424
facilitycode: 23
facilitylabel: local7
fqdn: /owa/auth/logon.aspx
localhostname: WAFirewall
localstarttime: 1694073372332
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:185.232.67.7', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 237.161.165.187
serverIP: 66.121.116.73
userName: - | Explain this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=122.200.82.137 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=2.156.200.34 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=2.156.200.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 51398,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/owa/auth/logon.aspx",
"localhostname": "WAFirewall",
"localstarttime": "1694073372303 ",
"message": "<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=122.200.82.137 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=2.156.200.34 spt=51398 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36\" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=2.156.200.34 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:185.232.67.7",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "2.156.200.34",
"serverIP": "122.200.82.137",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=122.200.82.137 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=2.156.200.34 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=2.156.200.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=122.200.82.137 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=2.156.200.34 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=2.156.200.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 51398
facilitycode: 23
facilitylabel: local7
fqdn: /owa/auth/logon.aspx
localhostname: WAFirewall
localstarttime: 1694073372303
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:185.232.67.7', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 2.156.200.34
serverIP: 122.200.82.137
userName: - | Explain this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=108.35.52.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=81.156.138.250 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=81.156.138.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 51398,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/owa/auth/logon.aspx",
"localhostname": "WAFirewall",
"localstarttime": "1694073372303 ",
"message": "<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=108.35.52.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=81.156.138.250 spt=51398 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication=\"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36\" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=81.156.138.250 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:185.232.67.7",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "81.156.138.250",
"serverIP": "108.35.52.168",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=108.35.52.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=81.156.138.250 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=81.156.138.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 7 02:56:12 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=108.35.52.168 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=81.156.138.250 spt=51398 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 07 2023 02:56:12 rt=1694073372303 request=/owa/auth/logon.aspx requestClientApplication="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36" dvchost=WAFirewall externalId=18a6ea43e7c-e966b0aa cn2=51398 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=81.156.138.250 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 51398
facilitycode: 23
facilitylabel: local7
fqdn: /owa/auth/logon.aspx
localhostname: WAFirewall
localstarttime: 1694073372303
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:185.232.67.7', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 81.156.138.250
serverIP: 108.35.52.168
userName: - | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=217.200.48.131 dst=225.108.101.19 protocol=tcp sport=51200 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=217.200.48.131 dst=225.108.101.19 protocol=tcp sport=51200 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51200,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "217.200.48.131",
"serverIP": "225.108.101.19"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=217.200.48.131 dst=225.108.101.19 protocol=tcp sport=51200 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=217.200.48.131 dst=225.108.101.19 protocol=tcp sport=51200 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51200
protocol: 6
streamName: meraki_l7_firewall
clientIP: 217.200.48.131
serverIP: 225.108.101.19 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=139.95.27.51 dst=159.156.1.223 protocol=tcp sport=51200 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=139.95.27.51 dst=159.156.1.223 protocol=tcp sport=51200 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51200,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "139.95.27.51",
"serverIP": "159.156.1.223"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=139.95.27.51 dst=159.156.1.223 protocol=tcp sport=51200 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=139.95.27.51 dst=159.156.1.223 protocol=tcp sport=51200 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51200
protocol: 6
streamName: meraki_l7_firewall
clientIP: 139.95.27.51
serverIP: 159.156.1.223 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=41.57.236.235 dst=37.230.30.80 protocol=tcp sport=51200 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=41.57.236.235 dst=37.230.30.80 protocol=tcp sport=51200 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51200,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "41.57.236.235",
"serverIP": "37.230.30.80"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=41.57.236.235 dst=37.230.30.80 protocol=tcp sport=51200 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=41.57.236.235 dst=37.230.30.80 protocol=tcp sport=51200 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51200
protocol: 6
streamName: meraki_l7_firewall
clientIP: 41.57.236.235
serverIP: 37.230.30.80 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=199.231.98.187 dst=209.211.38.128 protocol=tcp sport=51200 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=199.231.98.187 dst=209.211.38.128 protocol=tcp sport=51200 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51200,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "199.231.98.187",
"serverIP": "209.211.38.128"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=199.231.98.187 dst=209.211.38.128 protocol=tcp sport=51200 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1658602348.761994419 M83_MX67C_MuscleShoals l7_firewall src=199.231.98.187 dst=209.211.38.128 protocol=tcp sport=51200 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51200
protocol: 6
streamName: meraki_l7_firewall
clientIP: 199.231.98.187
serverIP: 209.211.38.128 | Explain this syslog message |
<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=232.200.168.27 dst=37.34.26.253 protocol=tcp sport=53358 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=232.200.168.27 dst=37.34.26.253 protocol=tcp sport=53358 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 53358,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "232.200.168.27",
"serverIP": "37.34.26.253"
} | Create a JSON artifact from the message |
<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=232.200.168.27 dst=37.34.26.253 protocol=tcp sport=53358 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=232.200.168.27 dst=37.34.26.253 protocol=tcp sport=53358 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 53358
protocol: 6
streamName: meraki_l7_firewall
clientIP: 232.200.168.27
serverIP: 37.34.26.253 | Explain this syslog message |
<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=128.161.13.69 dst=203.213.60.177 protocol=tcp sport=53358 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=128.161.13.69 dst=203.213.60.177 protocol=tcp sport=53358 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 53358,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "128.161.13.69",
"serverIP": "203.213.60.177"
} | Create a JSON artifact from the message |
<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=128.161.13.69 dst=203.213.60.177 protocol=tcp sport=53358 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=128.161.13.69 dst=203.213.60.177 protocol=tcp sport=53358 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 53358
protocol: 6
streamName: meraki_l7_firewall
clientIP: 128.161.13.69
serverIP: 203.213.60.177 | Explain this syslog message |
<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=225.105.49.11 dst=30.20.240.17 protocol=tcp sport=53358 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=225.105.49.11 dst=30.20.240.17 protocol=tcp sport=53358 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 53358,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "225.105.49.11",
"serverIP": "30.20.240.17"
} | Create a JSON artifact from the message |
<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=225.105.49.11 dst=30.20.240.17 protocol=tcp sport=53358 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=225.105.49.11 dst=30.20.240.17 protocol=tcp sport=53358 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 53358
protocol: 6
streamName: meraki_l7_firewall
clientIP: 225.105.49.11
serverIP: 30.20.240.17 | Explain this syslog message |
<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=154.212.141.253 dst=160.172.186.95 protocol=tcp sport=53358 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=154.212.141.253 dst=160.172.186.95 protocol=tcp sport=53358 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 53358,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "154.212.141.253",
"serverIP": "160.172.186.95"
} | Create a JSON artifact from the message |
<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=154.212.141.253 dst=160.172.186.95 protocol=tcp sport=53358 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=156.19.155.186 1 1658602361.901666941 M47_MX67C_Opelika l7_firewall src=154.212.141.253 dst=160.172.186.95 protocol=tcp sport=53358 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 53358
protocol: 6
streamName: meraki_l7_firewall
clientIP: 154.212.141.253
serverIP: 160.172.186.95 | Explain this syslog message |
<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=173.38.223.38 dst=118.64.89.201 protocol=tcp sport=64927 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=173.38.223.38 dst=118.64.89.201 protocol=tcp sport=64927 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64927,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "173.38.223.38",
"serverIP": "118.64.89.201"
} | Create a JSON artifact from the message |
<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=173.38.223.38 dst=118.64.89.201 protocol=tcp sport=64927 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=173.38.223.38 dst=118.64.89.201 protocol=tcp sport=64927 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64927
protocol: 6
streamName: meraki_l7_firewall
clientIP: 173.38.223.38
serverIP: 118.64.89.201 | Explain this syslog message |
<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=96.87.75.65 dst=205.61.86.33 protocol=tcp sport=64927 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=96.87.75.65 dst=205.61.86.33 protocol=tcp sport=64927 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64927,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "96.87.75.65",
"serverIP": "205.61.86.33"
} | Create a JSON artifact from the message |
<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=96.87.75.65 dst=205.61.86.33 protocol=tcp sport=64927 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=96.87.75.65 dst=205.61.86.33 protocol=tcp sport=64927 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64927
protocol: 6
streamName: meraki_l7_firewall
clientIP: 96.87.75.65
serverIP: 205.61.86.33 | Explain this syslog message |
<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=248.195.236.207 dst=123.221.139.125 protocol=tcp sport=64927 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=248.195.236.207 dst=123.221.139.125 protocol=tcp sport=64927 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64927,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "248.195.236.207",
"serverIP": "123.221.139.125"
} | Create a JSON artifact from the message |
<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=248.195.236.207 dst=123.221.139.125 protocol=tcp sport=64927 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=248.195.236.207 dst=123.221.139.125 protocol=tcp sport=64927 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64927
protocol: 6
streamName: meraki_l7_firewall
clientIP: 248.195.236.207
serverIP: 123.221.139.125 | Explain this syslog message |
<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=84.135.50.183 dst=90.29.40.138 protocol=tcp sport=64927 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=84.135.50.183 dst=90.29.40.138 protocol=tcp sport=64927 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64927,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "84.135.50.183",
"serverIP": "90.29.40.138"
} | Create a JSON artifact from the message |
<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=84.135.50.183 dst=90.29.40.138 protocol=tcp sport=64927 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=156.19.155.186 1 1658600560.497325130 M47_MX67C_Opelika l7_firewall src=84.135.50.183 dst=90.29.40.138 protocol=tcp sport=64927 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64927
protocol: 6
streamName: meraki_l7_firewall
clientIP: 84.135.50.183
serverIP: 90.29.40.138 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-01-02T13:00:06.379Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-01-02T13:00:07.389Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t207.82.104.73\n\tSource Port:\t\t61289\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"207.82.104.73","IpPort":"61289","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":35100}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6731888537,"task":"Logon"}} | {
"action": "Logon",
"clientport": 61289,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-01-02T13:00:06.379Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-01-02T13:00:07.389Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tsdpb.local\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCMANAGEENGINE\\n\\tSource Network Address:\\t207.82.104.73\\n\\tSource Port:\\t\\t61289\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"207.82.104.73\",\"IpPort\":\"61289\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"sdpb.local\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCMANAGEENGINE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":35100}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6731888537,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6731888537",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "207.82.104.73",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-01-02T13:00:06.379Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-01-02T13:00:07.389Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t207.82.104.73\n\tSource Port:\t\t61289\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"207.82.104.73","IpPort":"61289","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":35100}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6731888537,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-01-02T13:00:06.379Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-01-02T13:00:07.389Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t207.82.104.73\n\tSource Port:\t\t61289\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"207.82.104.73","IpPort":"61289","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":35100}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6731888537,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 61289
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6731888537
streamName: microsoft-windows-security-auditing
clientIP: 207.82.104.73
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-01-02T13:00:06.379Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-01-02T13:00:07.389Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t226.73.188.143\n\tSource Port:\t\t61289\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"226.73.188.143","IpPort":"61289","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":35100}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6731888537,"task":"Logon"}} | {
"action": "Logon",
"clientport": 61289,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-01-02T13:00:06.379Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-01-02T13:00:07.389Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tsdpb.local\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCMANAGEENGINE\\n\\tSource Network Address:\\t226.73.188.143\\n\\tSource Port:\\t\\t61289\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"226.73.188.143\",\"IpPort\":\"61289\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"sdpb.local\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCMANAGEENGINE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":35100}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6731888537,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6731888537",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "226.73.188.143",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-01-02T13:00:06.379Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-01-02T13:00:07.389Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t226.73.188.143\n\tSource Port:\t\t61289\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"226.73.188.143","IpPort":"61289","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":35100}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6731888537,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-01-02T13:00:06.379Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-01-02T13:00:07.389Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t226.73.188.143\n\tSource Port:\t\t61289\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"226.73.188.143","IpPort":"61289","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":35100}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6731888537,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 61289
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6731888537
streamName: microsoft-windows-security-auditing
clientIP: 226.73.188.143
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-01-02T13:00:06.379Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-01-02T13:00:07.389Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t99.57.201.136\n\tSource Port:\t\t61289\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"99.57.201.136","IpPort":"61289","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":35100}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6731888537,"task":"Logon"}} | {
"action": "Logon",
"clientport": 61289,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-01-02T13:00:06.379Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-01-02T13:00:07.389Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tsdpb.local\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCMANAGEENGINE\\n\\tSource Network Address:\\t99.57.201.136\\n\\tSource Port:\\t\\t61289\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"99.57.201.136\",\"IpPort\":\"61289\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"sdpb.local\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCMANAGEENGINE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":35100}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6731888537,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6731888537",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "99.57.201.136",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-01-02T13:00:06.379Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-01-02T13:00:07.389Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t99.57.201.136\n\tSource Port:\t\t61289\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"99.57.201.136","IpPort":"61289","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":35100}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6731888537,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-01-02T13:00:06.379Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-01-02T13:00:07.389Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t99.57.201.136\n\tSource Port:\t\t61289\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"99.57.201.136","IpPort":"61289","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":35100}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6731888537,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 61289
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6731888537
streamName: microsoft-windows-security-auditing
clientIP: 99.57.201.136
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-01-02T13:00:06.379Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-01-02T13:00:07.389Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t136.25.231.226\n\tSource Port:\t\t61289\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"136.25.231.226","IpPort":"61289","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":35100}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6731888537,"task":"Logon"}} | {
"action": "Logon",
"clientport": 61289,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-01-02T13:00:06.379Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-01-02T13:00:07.389Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tsdpb.local\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCMANAGEENGINE\\n\\tSource Network Address:\\t136.25.231.226\\n\\tSource Port:\\t\\t61289\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"136.25.231.226\",\"IpPort\":\"61289\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"sdpb.local\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCMANAGEENGINE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":35100}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6731888537,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6731888537",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "136.25.231.226",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-01-02T13:00:06.379Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-01-02T13:00:07.389Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t136.25.231.226\n\tSource Port:\t\t61289\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"136.25.231.226","IpPort":"61289","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":35100}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6731888537,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-01-02T13:00:06.379Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-01-02T13:00:07.389Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tsdpb.local\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCMANAGEENGINE\n\tSource Network Address:\t136.25.231.226\n\tSource Port:\t\t61289\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"136.25.231.226","IpPort":"61289","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"sdpb.local","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCMANAGEENGINE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":35100}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6731888537,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 61289
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6731888537
streamName: microsoft-windows-security-auditing
clientIP: 136.25.231.226
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"147.131.109.106","externalIp":"3.152.136.74","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=147.131.109.106 ::: serverIP=3.152.136.74 ::: userName=janedoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "packagefees.info",
"message": "WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={\"originId\":410612426,\"originType\":\"AD Users\",\"internalIp\":\"147.131.109.106\",\"externalIp\":\"3.152.136.74\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"packagefees.info\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-10T15:30:47.000Z\"} ::: clientIP=147.131.109.106 ::: serverIP=3.152.136.74 ::: userName=janedoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "packagefees.info",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-10T15:30:47.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "147.131.109.106",
"serverIP": "3.152.136.74",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"147.131.109.106","externalIp":"3.152.136.74","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=147.131.109.106 ::: serverIP=3.152.136.74 ::: userName=janedoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"147.131.109.106","externalIp":"3.152.136.74","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=147.131.109.106 ::: serverIP=3.152.136.74 ::: userName=janedoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: packagefees.info
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: packagefees.info
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-10T15:30:47.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 147.131.109.106
serverIP: 3.152.136.74
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"98.71.119.32","externalIp":"174.6.205.145","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=98.71.119.32 ::: serverIP=174.6.205.145 ::: userName=janedoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "packagefees.info",
"message": "WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={\"originId\":410612426,\"originType\":\"AD Users\",\"internalIp\":\"98.71.119.32\",\"externalIp\":\"174.6.205.145\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"packagefees.info\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-10T15:30:47.000Z\"} ::: clientIP=98.71.119.32 ::: serverIP=174.6.205.145 ::: userName=janedoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "packagefees.info",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-10T15:30:47.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "98.71.119.32",
"serverIP": "174.6.205.145",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"98.71.119.32","externalIp":"174.6.205.145","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=98.71.119.32 ::: serverIP=174.6.205.145 ::: userName=janedoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"98.71.119.32","externalIp":"174.6.205.145","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=98.71.119.32 ::: serverIP=174.6.205.145 ::: userName=janedoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: packagefees.info
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: packagefees.info
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-10T15:30:47.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 98.71.119.32
serverIP: 174.6.205.145
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"5.198.71.191","externalIp":"105.239.245.135","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=5.198.71.191 ::: serverIP=105.239.245.135 ::: userName=johndoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "packagefees.info",
"message": "WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={\"originId\":410612426,\"originType\":\"AD Users\",\"internalIp\":\"5.198.71.191\",\"externalIp\":\"105.239.245.135\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"packagefees.info\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-10T15:30:47.000Z\"} ::: clientIP=5.198.71.191 ::: serverIP=105.239.245.135 ::: userName=johndoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "packagefees.info",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-10T15:30:47.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "5.198.71.191",
"serverIP": "105.239.245.135",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"5.198.71.191","externalIp":"105.239.245.135","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=5.198.71.191 ::: serverIP=105.239.245.135 ::: userName=johndoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"5.198.71.191","externalIp":"105.239.245.135","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=5.198.71.191 ::: serverIP=105.239.245.135 ::: userName=johndoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: packagefees.info
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: packagefees.info
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-10T15:30:47.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 5.198.71.191
serverIP: 105.239.245.135
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"249.96.10.65","externalIp":"210.62.74.93","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=249.96.10.65 ::: serverIP=210.62.74.93 ::: userName=johndoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "packagefees.info",
"message": "WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={\"originId\":410612426,\"originType\":\"AD Users\",\"internalIp\":\"249.96.10.65\",\"externalIp\":\"210.62.74.93\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"packagefees.info\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-10T15:30:47.000Z\"} ::: clientIP=249.96.10.65 ::: serverIP=210.62.74.93 ::: userName=johndoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "packagefees.info",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-10T15:30:47.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "249.96.10.65",
"serverIP": "210.62.74.93",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"249.96.10.65","externalIp":"210.62.74.93","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=249.96.10.65 ::: serverIP=210.62.74.93 ::: userName=johndoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"249.96.10.65","externalIp":"210.62.74.93","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=249.96.10.65 ::: serverIP=210.62.74.93 ::: userName=johndoe ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: packagefees.info
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: packagefees.info
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-10T15:30:47.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 249.96.10.65
serverIP: 210.62.74.93
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"204.114.158.138","externalIp":"203.49.172.55","categories":["Malware"],"tags":[],"destination":"graywhalefoundation.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-04-10T16:09:56.000Z"} ::: clientIP=204.114.158.138 ::: serverIP=203.49.172.55 ::: userName=johndoe ::: created_at=2023-04-10T16:09:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T16:09:56.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "graywhalefoundation.org",
"message": "WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"204.114.158.138\",\"externalIp\":\"203.49.172.55\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"graywhalefoundation.org\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-10T16:09:56.000Z\"} ::: clientIP=204.114.158.138 ::: serverIP=203.49.172.55 ::: userName=johndoe ::: created_at=2023-04-10T16:09:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T16:09:56.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "graywhalefoundation.org",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-10T16:09:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "204.114.158.138",
"serverIP": "203.49.172.55",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"204.114.158.138","externalIp":"203.49.172.55","categories":["Malware"],"tags":[],"destination":"graywhalefoundation.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-04-10T16:09:56.000Z"} ::: clientIP=204.114.158.138 ::: serverIP=203.49.172.55 ::: userName=johndoe ::: created_at=2023-04-10T16:09:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T16:09:56.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"204.114.158.138","externalIp":"203.49.172.55","categories":["Malware"],"tags":[],"destination":"graywhalefoundation.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-04-10T16:09:56.000Z"} ::: clientIP=204.114.158.138 ::: serverIP=203.49.172.55 ::: userName=johndoe ::: created_at=2023-04-10T16:09:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T16:09:56.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: graywhalefoundation.org
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: graywhalefoundation.org
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-10T16:09:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 204.114.158.138
serverIP: 203.49.172.55
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"210.255.83.104","externalIp":"44.206.75.240","categories":["Malware"],"tags":[],"destination":"graywhalefoundation.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-04-10T16:09:56.000Z"} ::: clientIP=210.255.83.104 ::: serverIP=44.206.75.240 ::: userName=charlie ::: created_at=2023-04-10T16:09:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T16:09:56.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "graywhalefoundation.org",
"message": "WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"210.255.83.104\",\"externalIp\":\"44.206.75.240\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"graywhalefoundation.org\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-10T16:09:56.000Z\"} ::: clientIP=210.255.83.104 ::: serverIP=44.206.75.240 ::: userName=charlie ::: created_at=2023-04-10T16:09:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T16:09:56.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "graywhalefoundation.org",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-10T16:09:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "210.255.83.104",
"serverIP": "44.206.75.240",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"210.255.83.104","externalIp":"44.206.75.240","categories":["Malware"],"tags":[],"destination":"graywhalefoundation.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-04-10T16:09:56.000Z"} ::: clientIP=210.255.83.104 ::: serverIP=44.206.75.240 ::: userName=charlie ::: created_at=2023-04-10T16:09:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T16:09:56.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=graywhalefoundation.org ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"210.255.83.104","externalIp":"44.206.75.240","categories":["Malware"],"tags":[],"destination":"graywhalefoundation.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-04-10T16:09:56.000Z"} ::: clientIP=210.255.83.104 ::: serverIP=44.206.75.240 ::: userName=charlie ::: created_at=2023-04-10T16:09:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T16:09:56.000Z ::: serverHostname=graywhalefoundation.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: graywhalefoundation.org
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: graywhalefoundation.org
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-10T16:09:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 210.255.83.104
serverIP: 44.206.75.240
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"40.153.226.233","externalIp":"94.4.47.251","categories":["Software/Technology","Malware","Phishing","Computers and Internet"],"tags":[],"destination":"staging.to-do.officeppe.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-11T01:15:21.000Z"} ::: clientIP=40.153.226.233 ::: serverIP=94.4.47.251 ::: userName=janedoe ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "staging.to-do.officeppe.com",
"message": "WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={\"originId\":410613010,\"originType\":\"AD Users\",\"internalIp\":\"40.153.226.233\",\"externalIp\":\"94.4.47.251\",\"categories\":[\"Software/Technology\",\"Malware\",\"Phishing\",\"Computers and Internet\"],\"tags\":[],\"destination\":\"staging.to-do.officeppe.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-11T01:15:21.000Z\"} ::: clientIP=40.153.226.233 ::: serverIP=94.4.47.251 ::: userName=janedoe ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "staging.to-do.officeppe.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-11T01:15:21.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Software/TechnologyMalwarePhishingComputers and Internet",
"streamName": "OpenDNS Detection",
"clientIP": "40.153.226.233",
"serverIP": "94.4.47.251",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"40.153.226.233","externalIp":"94.4.47.251","categories":["Software/Technology","Malware","Phishing","Computers and Internet"],"tags":[],"destination":"staging.to-do.officeppe.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-11T01:15:21.000Z"} ::: clientIP=40.153.226.233 ::: serverIP=94.4.47.251 ::: userName=janedoe ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"40.153.226.233","externalIp":"94.4.47.251","categories":["Software/Technology","Malware","Phishing","Computers and Internet"],"tags":[],"destination":"staging.to-do.officeppe.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-04-11T01:15:21.000Z"} ::: clientIP=40.153.226.233 ::: serverIP=94.4.47.251 ::: userName=janedoe ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: staging.to-do.officeppe.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: staging.to-do.officeppe.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-11T01:15:21.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Software/TechnologyMalwarePhishingComputers and Internet
streamName: OpenDNS Detection
clientIP: 40.153.226.233
serverIP: 94.4.47.251
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"174.49.146.53","externalIp":"186.177.222.29","categories":["Software/Technology","Malware","Phishing","Computers and Internet"],"tags":[],"destination":"staging.to-do.officeppe.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-04-11T01:15:21.000Z"} ::: clientIP=174.49.146.53 ::: serverIP=186.177.222.29 ::: userName=alice ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "staging.to-do.officeppe.com",
"message": "WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={\"originId\":410613010,\"originType\":\"AD Users\",\"internalIp\":\"174.49.146.53\",\"externalIp\":\"186.177.222.29\",\"categories\":[\"Software/Technology\",\"Malware\",\"Phishing\",\"Computers and Internet\"],\"tags\":[],\"destination\":\"staging.to-do.officeppe.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-11T01:15:21.000Z\"} ::: clientIP=174.49.146.53 ::: serverIP=186.177.222.29 ::: userName=alice ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "staging.to-do.officeppe.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-11T01:15:21.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Software/TechnologyMalwarePhishingComputers and Internet",
"streamName": "OpenDNS Detection",
"clientIP": "174.49.146.53",
"serverIP": "186.177.222.29",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"174.49.146.53","externalIp":"186.177.222.29","categories":["Software/Technology","Malware","Phishing","Computers and Internet"],"tags":[],"destination":"staging.to-do.officeppe.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-04-11T01:15:21.000Z"} ::: clientIP=174.49.146.53 ::: serverIP=186.177.222.29 ::: userName=alice ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={"originId":410613010,"originType":"AD Users","internalIp":"174.49.146.53","externalIp":"186.177.222.29","categories":["Software/Technology","Malware","Phishing","Computers and Internet"],"tags":[],"destination":"staging.to-do.officeppe.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-04-11T01:15:21.000Z"} ::: clientIP=174.49.146.53 ::: serverIP=186.177.222.29 ::: userName=alice ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: staging.to-do.officeppe.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: staging.to-do.officeppe.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-11T01:15:21.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Software/TechnologyMalwarePhishingComputers and Internet
streamName: OpenDNS Detection
clientIP: 174.49.146.53
serverIP: 186.177.222.29
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"217.17.159.27","externalIp":"213.250.87.18","categories":["Software/Technology","Malware","Phishing","Computers and Internet"],"tags":[],"destination":"staging.to-do.officeppe.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-04-11T01:15:21.000Z"} ::: clientIP=217.17.159.27 ::: serverIP=213.250.87.18 ::: userName=charlie ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "staging.to-do.officeppe.com",
"message": "WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"217.17.159.27\",\"externalIp\":\"213.250.87.18\",\"categories\":[\"Software/Technology\",\"Malware\",\"Phishing\",\"Computers and Internet\"],\"tags\":[],\"destination\":\"staging.to-do.officeppe.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-11T01:15:21.000Z\"} ::: clientIP=217.17.159.27 ::: serverIP=213.250.87.18 ::: userName=charlie ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "staging.to-do.officeppe.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-11T01:15:21.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Software/TechnologyMalwarePhishingComputers and Internet",
"streamName": "OpenDNS Detection",
"clientIP": "217.17.159.27",
"serverIP": "213.250.87.18",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"217.17.159.27","externalIp":"213.250.87.18","categories":["Software/Technology","Malware","Phishing","Computers and Internet"],"tags":[],"destination":"staging.to-do.officeppe.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-04-11T01:15:21.000Z"} ::: clientIP=217.17.159.27 ::: serverIP=213.250.87.18 ::: userName=charlie ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"217.17.159.27","externalIp":"213.250.87.18","categories":["Software/Technology","Malware","Phishing","Computers and Internet"],"tags":[],"destination":"staging.to-do.officeppe.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-04-11T01:15:21.000Z"} ::: clientIP=217.17.159.27 ::: serverIP=213.250.87.18 ::: userName=charlie ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: staging.to-do.officeppe.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: staging.to-do.officeppe.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-11T01:15:21.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Software/TechnologyMalwarePhishingComputers and Internet
streamName: OpenDNS Detection
clientIP: 217.17.159.27
serverIP: 213.250.87.18
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"148.161.83.4","externalIp":"163.188.204.134","categories":["Software/Technology","Malware","Phishing","Computers and Internet"],"tags":[],"destination":"staging.to-do.officeppe.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-04-11T01:15:21.000Z"} ::: clientIP=148.161.83.4 ::: serverIP=163.188.204.134 ::: userName=charlie ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "staging.to-do.officeppe.com",
"message": "WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"148.161.83.4\",\"externalIp\":\"163.188.204.134\",\"categories\":[\"Software/Technology\",\"Malware\",\"Phishing\",\"Computers and Internet\"],\"tags\":[],\"destination\":\"staging.to-do.officeppe.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-11T01:15:21.000Z\"} ::: clientIP=148.161.83.4 ::: serverIP=163.188.204.134 ::: userName=charlie ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "staging.to-do.officeppe.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-11T01:15:21.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Software/TechnologyMalwarePhishingComputers and Internet",
"streamName": "OpenDNS Detection",
"clientIP": "148.161.83.4",
"serverIP": "163.188.204.134",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"148.161.83.4","externalIp":"163.188.204.134","categories":["Software/Technology","Malware","Phishing","Computers and Internet"],"tags":[],"destination":"staging.to-do.officeppe.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-04-11T01:15:21.000Z"} ::: clientIP=148.161.83.4 ::: serverIP=163.188.204.134 ::: userName=charlie ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=staging.to-do.officeppe.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"148.161.83.4","externalIp":"163.188.204.134","categories":["Software/Technology","Malware","Phishing","Computers and Internet"],"tags":[],"destination":"staging.to-do.officeppe.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-04-11T01:15:21.000Z"} ::: clientIP=148.161.83.4 ::: serverIP=163.188.204.134 ::: userName=charlie ::: created_at=2023-04-11T01:15:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyMalwarePhishingComputers and Internet ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-11T01:15:21.000Z ::: serverHostname=staging.to-do.officeppe.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: staging.to-do.officeppe.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: staging.to-do.officeppe.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-11T01:15:21.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Software/TechnologyMalwarePhishingComputers and Internet
streamName: OpenDNS Detection
clientIP: 148.161.83.4
serverIP: 163.188.204.134
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"41.219.253.0","externalIp":"192.245.159.23","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=41.219.253.0 ::: serverIP=192.245.159.23 ::: userName=bob ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "packagefees.info",
"message": "WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={\"originId\":410612426,\"originType\":\"AD Users\",\"internalIp\":\"41.219.253.0\",\"externalIp\":\"192.245.159.23\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"packagefees.info\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-10T15:30:47.000Z\"} ::: clientIP=41.219.253.0 ::: serverIP=192.245.159.23 ::: userName=bob ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "packagefees.info",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-10T15:30:47.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "41.219.253.0",
"serverIP": "192.245.159.23",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"41.219.253.0","externalIp":"192.245.159.23","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=41.219.253.0 ::: serverIP=192.245.159.23 ::: userName=bob ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"41.219.253.0","externalIp":"192.245.159.23","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=41.219.253.0 ::: serverIP=192.245.159.23 ::: userName=bob ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: packagefees.info
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: packagefees.info
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-10T15:30:47.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 41.219.253.0
serverIP: 192.245.159.23
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"79.135.236.184","externalIp":"163.200.216.22","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=79.135.236.184 ::: serverIP=163.200.216.22 ::: userName=charlie ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "packagefees.info",
"message": "WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={\"originId\":410612426,\"originType\":\"AD Users\",\"internalIp\":\"79.135.236.184\",\"externalIp\":\"163.200.216.22\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"packagefees.info\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-04-10T15:30:47.000Z\"} ::: clientIP=79.135.236.184 ::: serverIP=163.200.216.22 ::: userName=charlie ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "packagefees.info",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-04-10T15:30:47.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwarePhishing",
"streamName": "OpenDNS Detection",
"clientIP": "79.135.236.184",
"serverIP": "163.200.216.22",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"79.135.236.184","externalIp":"163.200.216.22","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=79.135.236.184 ::: serverIP=163.200.216.22 ::: userName=charlie ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=packagefees.info ::: action=BLOCKED ::: message={"originId":410612426,"originType":"AD Users","internalIp":"79.135.236.184","externalIp":"163.200.216.22","categories":["Malware","Phishing"],"tags":[],"destination":"packagefees.info","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-04-10T15:30:47.000Z"} ::: clientIP=79.135.236.184 ::: serverIP=163.200.216.22 ::: userName=charlie ::: created_at=2023-04-10T15:30:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-04-10T15:30:47.000Z ::: serverHostname=packagefees.info ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: packagefees.info
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: packagefees.info
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-04-10T15:30:47.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwarePhishing
streamName: OpenDNS Detection
clientIP: 79.135.236.184
serverIP: 163.200.216.22
userName: charlie | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.