input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"2.45.91.201","externalIp":"66.54.115.215","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=2.45.91.201 ::: serverIP=66.54.115.215 ::: userName=janedoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"2.45.91.201","externalIp":"66.54.115.215","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=2.45.91.201 ::: serverIP=66.54.115.215 ::: userName=janedoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-06T09:52:09.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: gwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: gwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 2.45.91.201
serverIP: 66.54.115.215
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"19.218.197.233","externalIp":"53.33.182.54","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=19.218.197.233 ::: serverIP=53.33.182.54 ::: userName=johndoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T12:27:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"19.218.197.233\",\"externalIp\":\"53.33.182.54\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T12:27:49.000Z\"} ::: clientIP=19.218.197.233 ::: serverIP=53.33.182.54 ::: userName=johndoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "19.218.197.233",
"serverIP": "53.33.182.54",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"19.218.197.233","externalIp":"53.33.182.54","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=19.218.197.233 ::: serverIP=53.33.182.54 ::: userName=johndoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"19.218.197.233","externalIp":"53.33.182.54","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=19.218.197.233 ::: serverIP=53.33.182.54 ::: userName=johndoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T12:27:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 19.218.197.233
serverIP: 53.33.182.54
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"155.203.9.6","externalIp":"116.98.86.158","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=155.203.9.6 ::: serverIP=116.98.86.158 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T12:27:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"155.203.9.6\",\"externalIp\":\"116.98.86.158\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T12:27:49.000Z\"} ::: clientIP=155.203.9.6 ::: serverIP=116.98.86.158 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "155.203.9.6",
"serverIP": "116.98.86.158",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"155.203.9.6","externalIp":"116.98.86.158","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=155.203.9.6 ::: serverIP=116.98.86.158 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"155.203.9.6","externalIp":"116.98.86.158","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=155.203.9.6 ::: serverIP=116.98.86.158 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T12:27:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 155.203.9.6
serverIP: 116.98.86.158
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"87.84.174.143","externalIp":"128.125.3.65","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=87.84.174.143 ::: serverIP=128.125.3.65 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-06T09:52:09.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"87.84.174.143\",\"externalIp\":\"128.125.3.65\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-06T09:52:09.000Z\"} ::: clientIP=87.84.174.143 ::: serverIP=128.125.3.65 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "gwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "gwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "87.84.174.143",
"serverIP": "128.125.3.65",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"87.84.174.143","externalIp":"128.125.3.65","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=87.84.174.143 ::: serverIP=128.125.3.65 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"87.84.174.143","externalIp":"128.125.3.65","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=87.84.174.143 ::: serverIP=128.125.3.65 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-06T09:52:09.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: gwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: gwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 87.84.174.143
serverIP: 128.125.3.65
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"137.195.195.94","externalIp":"153.37.154.140","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=137.195.195.94 ::: serverIP=153.37.154.140 ::: userName=charlie ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-06T09:52:09.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"137.195.195.94\",\"externalIp\":\"153.37.154.140\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-06T09:52:09.000Z\"} ::: clientIP=137.195.195.94 ::: serverIP=153.37.154.140 ::: userName=charlie ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "gwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "gwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "137.195.195.94",
"serverIP": "153.37.154.140",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"137.195.195.94","externalIp":"153.37.154.140","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=137.195.195.94 ::: serverIP=153.37.154.140 ::: userName=charlie ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"137.195.195.94","externalIp":"153.37.154.140","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=137.195.195.94 ::: serverIP=153.37.154.140 ::: userName=charlie ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-06T09:52:09.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: gwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: gwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 137.195.195.94
serverIP: 153.37.154.140
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612760,"originType":"AD Users","internalIp":"40.142.164.60","externalIp":"145.153.121.212","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:24:34.000Z"} ::: clientIP=40.142.164.60 ::: serverIP=145.153.121.212 ::: userName=johndoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-12T20:24:34.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612760,\"originType\":\"AD Users\",\"internalIp\":\"40.142.164.60\",\"externalIp\":\"145.153.121.212\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-12T20:24:34.000Z\"} ::: clientIP=40.142.164.60 ::: serverIP=145.153.121.212 ::: userName=johndoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "40.142.164.60",
"serverIP": "145.153.121.212",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612760,"originType":"AD Users","internalIp":"40.142.164.60","externalIp":"145.153.121.212","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:24:34.000Z"} ::: clientIP=40.142.164.60 ::: serverIP=145.153.121.212 ::: userName=johndoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612760,"originType":"AD Users","internalIp":"40.142.164.60","externalIp":"145.153.121.212","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:24:34.000Z"} ::: clientIP=40.142.164.60 ::: serverIP=145.153.121.212 ::: userName=johndoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-12T20:24:34.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 40.142.164.60
serverIP: 145.153.121.212
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612760,"originType":"AD Users","internalIp":"161.71.92.99","externalIp":"119.105.124.196","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:24:34.000Z"} ::: clientIP=161.71.92.99 ::: serverIP=119.105.124.196 ::: userName=janedoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-12T20:24:34.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612760,\"originType\":\"AD Users\",\"internalIp\":\"161.71.92.99\",\"externalIp\":\"119.105.124.196\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-12T20:24:34.000Z\"} ::: clientIP=161.71.92.99 ::: serverIP=119.105.124.196 ::: userName=janedoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "161.71.92.99",
"serverIP": "119.105.124.196",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612760,"originType":"AD Users","internalIp":"161.71.92.99","externalIp":"119.105.124.196","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:24:34.000Z"} ::: clientIP=161.71.92.99 ::: serverIP=119.105.124.196 ::: userName=janedoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612760,"originType":"AD Users","internalIp":"161.71.92.99","externalIp":"119.105.124.196","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:24:34.000Z"} ::: clientIP=161.71.92.99 ::: serverIP=119.105.124.196 ::: userName=janedoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-12T20:24:34.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 161.71.92.99
serverIP: 119.105.124.196
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"73.61.102.156","externalIp":"52.183.28.203","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=73.61.102.156 ::: serverIP=52.183.28.203 ::: userName=bob ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T18:10:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612132,\"originType\":\"AD Users\",\"internalIp\":\"73.61.102.156\",\"externalIp\":\"52.183.28.203\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T18:10:31.000Z\"} ::: clientIP=73.61.102.156 ::: serverIP=52.183.28.203 ::: userName=bob ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "73.61.102.156",
"serverIP": "52.183.28.203",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"73.61.102.156","externalIp":"52.183.28.203","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=73.61.102.156 ::: serverIP=52.183.28.203 ::: userName=bob ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"73.61.102.156","externalIp":"52.183.28.203","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=73.61.102.156 ::: serverIP=52.183.28.203 ::: userName=bob ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T18:10:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 73.61.102.156
serverIP: 52.183.28.203
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"164.106.79.171","externalIp":"16.245.140.87","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=164.106.79.171 ::: serverIP=16.245.140.87 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T18:10:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612132,\"originType\":\"AD Users\",\"internalIp\":\"164.106.79.171\",\"externalIp\":\"16.245.140.87\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T18:10:31.000Z\"} ::: clientIP=164.106.79.171 ::: serverIP=16.245.140.87 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "164.106.79.171",
"serverIP": "16.245.140.87",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"164.106.79.171","externalIp":"16.245.140.87","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=164.106.79.171 ::: serverIP=16.245.140.87 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"164.106.79.171","externalIp":"16.245.140.87","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=164.106.79.171 ::: serverIP=16.245.140.87 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T18:10:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 164.106.79.171
serverIP: 16.245.140.87
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"237.35.44.213","externalIp":"179.22.99.183","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=237.35.44.213 ::: serverIP=179.22.99.183 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T18:10:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612132,\"originType\":\"AD Users\",\"internalIp\":\"237.35.44.213\",\"externalIp\":\"179.22.99.183\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T18:10:31.000Z\"} ::: clientIP=237.35.44.213 ::: serverIP=179.22.99.183 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "237.35.44.213",
"serverIP": "179.22.99.183",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"237.35.44.213","externalIp":"179.22.99.183","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=237.35.44.213 ::: serverIP=179.22.99.183 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"237.35.44.213","externalIp":"179.22.99.183","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=237.35.44.213 ::: serverIP=179.22.99.183 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T18:10:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 237.35.44.213
serverIP: 179.22.99.183
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"243.230.42.252","externalIp":"167.91.63.105","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=243.230.42.252 ::: serverIP=167.91.63.105 ::: userName=alice ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T18:10:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612132,\"originType\":\"AD Users\",\"internalIp\":\"243.230.42.252\",\"externalIp\":\"167.91.63.105\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T18:10:31.000Z\"} ::: clientIP=243.230.42.252 ::: serverIP=167.91.63.105 ::: userName=alice ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "243.230.42.252",
"serverIP": "167.91.63.105",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"243.230.42.252","externalIp":"167.91.63.105","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=243.230.42.252 ::: serverIP=167.91.63.105 ::: userName=alice ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"243.230.42.252","externalIp":"167.91.63.105","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=243.230.42.252 ::: serverIP=167.91.63.105 ::: userName=alice ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T18:10:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 243.230.42.252
serverIP: 167.91.63.105
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"31.123.114.32","externalIp":"236.58.231.246","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=31.123.114.32 ::: serverIP=236.58.231.246 ::: userName=nighthawk ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T12:27:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"31.123.114.32\",\"externalIp\":\"236.58.231.246\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T12:27:49.000Z\"} ::: clientIP=31.123.114.32 ::: serverIP=236.58.231.246 ::: userName=nighthawk ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "31.123.114.32",
"serverIP": "236.58.231.246",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"31.123.114.32","externalIp":"236.58.231.246","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=31.123.114.32 ::: serverIP=236.58.231.246 ::: userName=nighthawk ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"31.123.114.32","externalIp":"236.58.231.246","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=31.123.114.32 ::: serverIP=236.58.231.246 ::: userName=nighthawk ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T12:27:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 31.123.114.32
serverIP: 236.58.231.246
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.210.69.106","externalIp":"143.101.105.217","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=54.210.69.106 ::: serverIP=143.101.105.217 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T12:27:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"54.210.69.106\",\"externalIp\":\"143.101.105.217\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T12:27:49.000Z\"} ::: clientIP=54.210.69.106 ::: serverIP=143.101.105.217 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "54.210.69.106",
"serverIP": "143.101.105.217",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.210.69.106","externalIp":"143.101.105.217","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=54.210.69.106 ::: serverIP=143.101.105.217 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.210.69.106","externalIp":"143.101.105.217","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=54.210.69.106 ::: serverIP=143.101.105.217 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T12:27:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 54.210.69.106
serverIP: 143.101.105.217
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612178,"originType":"AD Users","internalIp":"103.244.221.26","externalIp":"83.244.172.227","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-02T23:43:59.000Z"} ::: clientIP=103.244.221.26 ::: serverIP=83.244.172.227 ::: userName=charlie ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-02T23:43:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612178,\"originType\":\"AD Users\",\"internalIp\":\"103.244.221.26\",\"externalIp\":\"83.244.172.227\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-02T23:43:59.000Z\"} ::: clientIP=103.244.221.26 ::: serverIP=83.244.172.227 ::: userName=charlie ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "103.244.221.26",
"serverIP": "83.244.172.227",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612178,"originType":"AD Users","internalIp":"103.244.221.26","externalIp":"83.244.172.227","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-02T23:43:59.000Z"} ::: clientIP=103.244.221.26 ::: serverIP=83.244.172.227 ::: userName=charlie ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612178,"originType":"AD Users","internalIp":"103.244.221.26","externalIp":"83.244.172.227","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-02T23:43:59.000Z"} ::: clientIP=103.244.221.26 ::: serverIP=83.244.172.227 ::: userName=charlie ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-02T23:43:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 103.244.221.26
serverIP: 83.244.172.227
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612178,"originType":"AD Users","internalIp":"129.53.22.52","externalIp":"220.19.156.44","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-02T23:43:59.000Z"} ::: clientIP=129.53.22.52 ::: serverIP=220.19.156.44 ::: userName=nighthawk ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-02T23:43:59.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612178,\"originType\":\"AD Users\",\"internalIp\":\"129.53.22.52\",\"externalIp\":\"220.19.156.44\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-02T23:43:59.000Z\"} ::: clientIP=129.53.22.52 ::: serverIP=220.19.156.44 ::: userName=nighthawk ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "129.53.22.52",
"serverIP": "220.19.156.44",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612178,"originType":"AD Users","internalIp":"129.53.22.52","externalIp":"220.19.156.44","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-02T23:43:59.000Z"} ::: clientIP=129.53.22.52 ::: serverIP=220.19.156.44 ::: userName=nighthawk ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612178,"originType":"AD Users","internalIp":"129.53.22.52","externalIp":"220.19.156.44","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-02T23:43:59.000Z"} ::: clientIP=129.53.22.52 ::: serverIP=220.19.156.44 ::: userName=nighthawk ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-02T23:43:59.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 129.53.22.52
serverIP: 220.19.156.44
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"144.25.156.228","externalIp":"107.208.208.165","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=144.25.156.228 ::: serverIP=107.208.208.165 ::: userName=johndoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-06T09:52:09.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"144.25.156.228\",\"externalIp\":\"107.208.208.165\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-06T09:52:09.000Z\"} ::: clientIP=144.25.156.228 ::: serverIP=107.208.208.165 ::: userName=johndoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "gwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "gwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "144.25.156.228",
"serverIP": "107.208.208.165",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"144.25.156.228","externalIp":"107.208.208.165","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=144.25.156.228 ::: serverIP=107.208.208.165 ::: userName=johndoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"144.25.156.228","externalIp":"107.208.208.165","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=144.25.156.228 ::: serverIP=107.208.208.165 ::: userName=johndoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-06T09:52:09.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: gwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: gwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 144.25.156.228
serverIP: 107.208.208.165
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"122.132.67.32","externalIp":"104.189.82.195","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=122.132.67.32 ::: serverIP=104.189.82.195 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-06T09:52:09.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"122.132.67.32\",\"externalIp\":\"104.189.82.195\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-06T09:52:09.000Z\"} ::: clientIP=122.132.67.32 ::: serverIP=104.189.82.195 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "gwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "gwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "122.132.67.32",
"serverIP": "104.189.82.195",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"122.132.67.32","externalIp":"104.189.82.195","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=122.132.67.32 ::: serverIP=104.189.82.195 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"122.132.67.32","externalIp":"104.189.82.195","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=122.132.67.32 ::: serverIP=104.189.82.195 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-06T09:52:09.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: gwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: gwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 122.132.67.32
serverIP: 104.189.82.195
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"196.226.138.104","externalIp":"182.131.150.182","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=196.226.138.104 ::: serverIP=182.131.150.182 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T12:27:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"196.226.138.104\",\"externalIp\":\"182.131.150.182\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T12:27:49.000Z\"} ::: clientIP=196.226.138.104 ::: serverIP=182.131.150.182 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "196.226.138.104",
"serverIP": "182.131.150.182",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"196.226.138.104","externalIp":"182.131.150.182","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=196.226.138.104 ::: serverIP=182.131.150.182 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"196.226.138.104","externalIp":"182.131.150.182","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=196.226.138.104 ::: serverIP=182.131.150.182 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T12:27:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 196.226.138.104
serverIP: 182.131.150.182
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"240.200.84.218","externalIp":"80.243.78.139","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=240.200.84.218 ::: serverIP=80.243.78.139 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T12:27:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"240.200.84.218\",\"externalIp\":\"80.243.78.139\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T12:27:49.000Z\"} ::: clientIP=240.200.84.218 ::: serverIP=80.243.78.139 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.viabtc.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.viabtc.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "240.200.84.218",
"serverIP": "80.243.78.139",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"240.200.84.218","externalIp":"80.243.78.139","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=240.200.84.218 ::: serverIP=80.243.78.139 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"240.200.84.218","externalIp":"80.243.78.139","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=240.200.84.218 ::: serverIP=80.243.78.139 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T12:27:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.viabtc.com
messagetype: firewall_action
severitycode: 2
fqdn: www.viabtc.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 240.200.84.218
serverIP: 80.243.78.139
userName: bob | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=87.61.49.229 dst=132.114.255.162 protocol=tcp sport=55009 dport=443 decision=blocked | {
"action": "block",
"clientport": 55009,
"message": "<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=87.61.49.229 dst=132.114.255.162 protocol=tcp sport=55009 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "87.61.49.229",
"serverIP": "132.114.255.162"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=87.61.49.229 dst=132.114.255.162 protocol=tcp sport=55009 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=87.61.49.229 dst=132.114.255.162 protocol=tcp sport=55009 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55009
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 87.61.49.229
serverIP: 132.114.255.162 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=214.60.129.86 dst=66.107.204.112 protocol=tcp sport=55009 dport=443 decision=blocked | {
"action": "block",
"clientport": 55009,
"message": "<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=214.60.129.86 dst=66.107.204.112 protocol=tcp sport=55009 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "214.60.129.86",
"serverIP": "66.107.204.112"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=214.60.129.86 dst=66.107.204.112 protocol=tcp sport=55009 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=214.60.129.86 dst=66.107.204.112 protocol=tcp sport=55009 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55009
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 214.60.129.86
serverIP: 66.107.204.112 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=204.137.163.249 dst=86.158.223.96 protocol=tcp sport=55009 dport=443 decision=blocked | {
"action": "block",
"clientport": 55009,
"message": "<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=204.137.163.249 dst=86.158.223.96 protocol=tcp sport=55009 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "204.137.163.249",
"serverIP": "86.158.223.96"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=204.137.163.249 dst=86.158.223.96 protocol=tcp sport=55009 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=204.137.163.249 dst=86.158.223.96 protocol=tcp sport=55009 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55009
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 204.137.163.249
serverIP: 86.158.223.96 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=19.95.159.38 dst=249.223.168.37 protocol=tcp sport=55009 dport=443 decision=blocked | {
"action": "block",
"clientport": 55009,
"message": "<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=19.95.159.38 dst=249.223.168.37 protocol=tcp sport=55009 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "19.95.159.38",
"serverIP": "249.223.168.37"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=19.95.159.38 dst=249.223.168.37 protocol=tcp sport=55009 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=19.95.159.38 dst=249.223.168.37 protocol=tcp sport=55009 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 55009
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 19.95.159.38
serverIP: 249.223.168.37 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=64.31.195.41 dst=190.156.248.127 protocol=tcp sport=57759 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=64.31.195.41 dst=190.156.248.127 protocol=tcp sport=57759 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57759,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "64.31.195.41",
"serverIP": "190.156.248.127"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=64.31.195.41 dst=190.156.248.127 protocol=tcp sport=57759 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=64.31.195.41 dst=190.156.248.127 protocol=tcp sport=57759 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57759
protocol: 6
streamName: meraki_l7_firewall
clientIP: 64.31.195.41
serverIP: 190.156.248.127 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=40.157.98.119 dst=95.9.239.237 protocol=tcp sport=57759 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=40.157.98.119 dst=95.9.239.237 protocol=tcp sport=57759 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57759,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "40.157.98.119",
"serverIP": "95.9.239.237"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=40.157.98.119 dst=95.9.239.237 protocol=tcp sport=57759 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=40.157.98.119 dst=95.9.239.237 protocol=tcp sport=57759 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57759
protocol: 6
streamName: meraki_l7_firewall
clientIP: 40.157.98.119
serverIP: 95.9.239.237 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=179.156.72.133 dst=101.225.78.80 protocol=tcp sport=57759 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=179.156.72.133 dst=101.225.78.80 protocol=tcp sport=57759 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57759,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "179.156.72.133",
"serverIP": "101.225.78.80"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=179.156.72.133 dst=101.225.78.80 protocol=tcp sport=57759 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=179.156.72.133 dst=101.225.78.80 protocol=tcp sport=57759 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57759
protocol: 6
streamName: meraki_l7_firewall
clientIP: 179.156.72.133
serverIP: 101.225.78.80 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=17.96.29.64 dst=226.219.49.32 protocol=tcp sport=57759 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=17.96.29.64 dst=226.219.49.32 protocol=tcp sport=57759 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57759,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "17.96.29.64",
"serverIP": "226.219.49.32"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=17.96.29.64 dst=226.219.49.32 protocol=tcp sport=57759 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=17.96.29.64 dst=226.219.49.32 protocol=tcp sport=57759 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57759
protocol: 6
streamName: meraki_l7_firewall
clientIP: 17.96.29.64
serverIP: 226.219.49.32 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=53.11.117.133 dst=59.79.186.80 protocol=tcp sport=55911 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=53.11.117.133 dst=59.79.186.80 protocol=tcp sport=55911 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 55911,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "53.11.117.133",
"serverIP": "59.79.186.80"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=53.11.117.133 dst=59.79.186.80 protocol=tcp sport=55911 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=53.11.117.133 dst=59.79.186.80 protocol=tcp sport=55911 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 55911
protocol: 6
streamName: meraki_l7_firewall
clientIP: 53.11.117.133
serverIP: 59.79.186.80 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=27.211.210.181 dst=245.219.164.103 protocol=tcp sport=55911 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=27.211.210.181 dst=245.219.164.103 protocol=tcp sport=55911 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 55911,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "27.211.210.181",
"serverIP": "245.219.164.103"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=27.211.210.181 dst=245.219.164.103 protocol=tcp sport=55911 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=27.211.210.181 dst=245.219.164.103 protocol=tcp sport=55911 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 55911
protocol: 6
streamName: meraki_l7_firewall
clientIP: 27.211.210.181
serverIP: 245.219.164.103 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=76.202.181.191 dst=57.65.176.42 protocol=tcp sport=55911 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=76.202.181.191 dst=57.65.176.42 protocol=tcp sport=55911 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 55911,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "76.202.181.191",
"serverIP": "57.65.176.42"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=76.202.181.191 dst=57.65.176.42 protocol=tcp sport=55911 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=76.202.181.191 dst=57.65.176.42 protocol=tcp sport=55911 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 55911
protocol: 6
streamName: meraki_l7_firewall
clientIP: 76.202.181.191
serverIP: 57.65.176.42 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=149.130.48.244 dst=227.46.171.146 protocol=tcp sport=55911 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=149.130.48.244 dst=227.46.171.146 protocol=tcp sport=55911 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 55911,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "149.130.48.244",
"serverIP": "227.46.171.146"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=149.130.48.244 dst=227.46.171.146 protocol=tcp sport=55911 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=149.130.48.244 dst=227.46.171.146 protocol=tcp sport=55911 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 55911
protocol: 6
streamName: meraki_l7_firewall
clientIP: 149.130.48.244
serverIP: 227.46.171.146 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attacmement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_acme.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@acme.bank"],"senderIP":"9.253.98.29","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=9.253.98.29 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=9.253.98.29 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "stephan.witolla@jobticket.de",
"emailsendingserver": "212.227.126.135",
"emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"filehash": "<169334821164.8788.14712446091347986247@jobticket.de>",
"filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attacmement\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attacmement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attacmeed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_acme.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@acme.bank\"],\"senderIP\":\"9.253.98.29\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=9.253.98.29 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=9.253.98.29 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T22:31:33.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "9.253.98.29"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attacmement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_acme.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@acme.bank"],"senderIP":"9.253.98.29","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=9.253.98.29 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=9.253.98.29 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attacmement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_acme.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@acme.bank"],"senderIP":"9.253.98.29","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=9.253.98.29 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=9.253.98.29 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: stephan.witolla@jobticket.de
emailsendingserver: 212.227.126.135
emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
filehash: <169334821164.8788.14712446091347986247@jobticket.de>
filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-29T22:31:33.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 9.253.98.29 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"133.27.175.167","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=133.27.175.167 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=133.27.175.167 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "stephan.witolla@jobticket.de",
"emailsendingserver": "212.227.126.135",
"emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"filehash": "<169334821164.8788.14712446091347986247@jobticket.de>",
"filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attwayneed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_wayne.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@wayne.bank\"],\"senderIP\":\"133.27.175.167\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=133.27.175.167 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=133.27.175.167 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T22:31:33.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "133.27.175.167"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"133.27.175.167","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=133.27.175.167 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=133.27.175.167 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"133.27.175.167","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=133.27.175.167 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=133.27.175.167 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: stephan.witolla@jobticket.de
emailsendingserver: 212.227.126.135
emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
filehash: <169334821164.8788.14712446091347986247@jobticket.de>
filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-08-29T22:31:33.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 133.27.175.167 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_stark.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@stark.bank"],"senderIP":"21.121.135.254","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=21.121.135.254 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=21.121.135.254 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "stephan.witolla@jobticket.de",
"emailsendingserver": "212.227.126.135",
"emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"filehash": "<169334821164.8788.14712446091347986247@jobticket.de>",
"filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attstarked\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_stark.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@stark.bank\"],\"senderIP\":\"21.121.135.254\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=21.121.135.254 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=21.121.135.254 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T22:31:33.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "21.121.135.254"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_stark.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@stark.bank"],"senderIP":"21.121.135.254","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=21.121.135.254 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=21.121.135.254 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.