input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"2.45.91.201","externalIp":"66.54.115.215","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=2.45.91.201 ::: serverIP=66.54.115.215 ::: userName=janedoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"2.45.91.201","externalIp":"66.54.115.215","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=2.45.91.201 ::: serverIP=66.54.115.215 ::: userName=janedoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-06T09:52:09.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: gwallcheck.api-alliance.com messagetype: firewall_action severitycode: 2 fqdn: gwallcheck.api-alliance.com vendorcode: Business ServicesPotentially HarmfulBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 2.45.91.201 serverIP: 66.54.115.215 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"19.218.197.233","externalIp":"53.33.182.54","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=19.218.197.233 ::: serverIP=53.33.182.54 ::: userName=johndoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T12:27:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"19.218.197.233\",\"externalIp\":\"53.33.182.54\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T12:27:49.000Z\"} ::: clientIP=19.218.197.233 ::: serverIP=53.33.182.54 ::: userName=johndoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "19.218.197.233", "serverIP": "53.33.182.54", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"19.218.197.233","externalIp":"53.33.182.54","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=19.218.197.233 ::: serverIP=53.33.182.54 ::: userName=johndoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"19.218.197.233","externalIp":"53.33.182.54","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=19.218.197.233 ::: serverIP=53.33.182.54 ::: userName=johndoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T12:27:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 19.218.197.233 serverIP: 53.33.182.54 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"155.203.9.6","externalIp":"116.98.86.158","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=155.203.9.6 ::: serverIP=116.98.86.158 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T12:27:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"155.203.9.6\",\"externalIp\":\"116.98.86.158\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T12:27:49.000Z\"} ::: clientIP=155.203.9.6 ::: serverIP=116.98.86.158 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "155.203.9.6", "serverIP": "116.98.86.158", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"155.203.9.6","externalIp":"116.98.86.158","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=155.203.9.6 ::: serverIP=116.98.86.158 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"155.203.9.6","externalIp":"116.98.86.158","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=155.203.9.6 ::: serverIP=116.98.86.158 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T12:27:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 155.203.9.6 serverIP: 116.98.86.158 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"87.84.174.143","externalIp":"128.125.3.65","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=87.84.174.143 ::: serverIP=128.125.3.65 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-06T09:52:09.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"87.84.174.143\",\"externalIp\":\"128.125.3.65\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-06T09:52:09.000Z\"} ::: clientIP=87.84.174.143 ::: serverIP=128.125.3.65 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "gwallcheck.api-alliance.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "gwallcheck.api-alliance.com", "vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "87.84.174.143", "serverIP": "128.125.3.65", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"87.84.174.143","externalIp":"128.125.3.65","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=87.84.174.143 ::: serverIP=128.125.3.65 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"87.84.174.143","externalIp":"128.125.3.65","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=87.84.174.143 ::: serverIP=128.125.3.65 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-06T09:52:09.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: gwallcheck.api-alliance.com messagetype: firewall_action severitycode: 2 fqdn: gwallcheck.api-alliance.com vendorcode: Business ServicesPotentially HarmfulBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 87.84.174.143 serverIP: 128.125.3.65 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"137.195.195.94","externalIp":"153.37.154.140","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=137.195.195.94 ::: serverIP=153.37.154.140 ::: userName=charlie ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-06T09:52:09.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"137.195.195.94\",\"externalIp\":\"153.37.154.140\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-06T09:52:09.000Z\"} ::: clientIP=137.195.195.94 ::: serverIP=153.37.154.140 ::: userName=charlie ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "gwallcheck.api-alliance.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "gwallcheck.api-alliance.com", "vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "137.195.195.94", "serverIP": "153.37.154.140", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"137.195.195.94","externalIp":"153.37.154.140","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=137.195.195.94 ::: serverIP=153.37.154.140 ::: userName=charlie ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"137.195.195.94","externalIp":"153.37.154.140","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=137.195.195.94 ::: serverIP=153.37.154.140 ::: userName=charlie ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-06T09:52:09.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: gwallcheck.api-alliance.com messagetype: firewall_action severitycode: 2 fqdn: gwallcheck.api-alliance.com vendorcode: Business ServicesPotentially HarmfulBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 137.195.195.94 serverIP: 153.37.154.140 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612760,"originType":"AD Users","internalIp":"40.142.164.60","externalIp":"145.153.121.212","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:24:34.000Z"} ::: clientIP=40.142.164.60 ::: serverIP=145.153.121.212 ::: userName=johndoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-12T20:24:34.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612760,\"originType\":\"AD Users\",\"internalIp\":\"40.142.164.60\",\"externalIp\":\"145.153.121.212\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-12T20:24:34.000Z\"} ::: clientIP=40.142.164.60 ::: serverIP=145.153.121.212 ::: userName=johndoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "40.142.164.60", "serverIP": "145.153.121.212", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612760,"originType":"AD Users","internalIp":"40.142.164.60","externalIp":"145.153.121.212","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:24:34.000Z"} ::: clientIP=40.142.164.60 ::: serverIP=145.153.121.212 ::: userName=johndoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612760,"originType":"AD Users","internalIp":"40.142.164.60","externalIp":"145.153.121.212","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:24:34.000Z"} ::: clientIP=40.142.164.60 ::: serverIP=145.153.121.212 ::: userName=johndoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-12T20:24:34.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 40.142.164.60 serverIP: 145.153.121.212 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612760,"originType":"AD Users","internalIp":"161.71.92.99","externalIp":"119.105.124.196","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:24:34.000Z"} ::: clientIP=161.71.92.99 ::: serverIP=119.105.124.196 ::: userName=janedoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-12T20:24:34.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612760,\"originType\":\"AD Users\",\"internalIp\":\"161.71.92.99\",\"externalIp\":\"119.105.124.196\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-12T20:24:34.000Z\"} ::: clientIP=161.71.92.99 ::: serverIP=119.105.124.196 ::: userName=janedoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "161.71.92.99", "serverIP": "119.105.124.196", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612760,"originType":"AD Users","internalIp":"161.71.92.99","externalIp":"119.105.124.196","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:24:34.000Z"} ::: clientIP=161.71.92.99 ::: serverIP=119.105.124.196 ::: userName=janedoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612760,"originType":"AD Users","internalIp":"161.71.92.99","externalIp":"119.105.124.196","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-12T20:24:34.000Z"} ::: clientIP=161.71.92.99 ::: serverIP=119.105.124.196 ::: userName=janedoe ::: created_at=2022-06-12T20:24:34.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-12T20:24:34.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-12T20:24:34.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 161.71.92.99 serverIP: 119.105.124.196 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"73.61.102.156","externalIp":"52.183.28.203","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=73.61.102.156 ::: serverIP=52.183.28.203 ::: userName=bob ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T18:10:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612132,\"originType\":\"AD Users\",\"internalIp\":\"73.61.102.156\",\"externalIp\":\"52.183.28.203\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T18:10:31.000Z\"} ::: clientIP=73.61.102.156 ::: serverIP=52.183.28.203 ::: userName=bob ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "73.61.102.156", "serverIP": "52.183.28.203", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"73.61.102.156","externalIp":"52.183.28.203","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=73.61.102.156 ::: serverIP=52.183.28.203 ::: userName=bob ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"73.61.102.156","externalIp":"52.183.28.203","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=73.61.102.156 ::: serverIP=52.183.28.203 ::: userName=bob ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T18:10:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 73.61.102.156 serverIP: 52.183.28.203 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"164.106.79.171","externalIp":"16.245.140.87","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=164.106.79.171 ::: serverIP=16.245.140.87 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T18:10:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612132,\"originType\":\"AD Users\",\"internalIp\":\"164.106.79.171\",\"externalIp\":\"16.245.140.87\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T18:10:31.000Z\"} ::: clientIP=164.106.79.171 ::: serverIP=16.245.140.87 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "164.106.79.171", "serverIP": "16.245.140.87", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"164.106.79.171","externalIp":"16.245.140.87","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=164.106.79.171 ::: serverIP=16.245.140.87 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"164.106.79.171","externalIp":"16.245.140.87","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=164.106.79.171 ::: serverIP=16.245.140.87 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T18:10:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 164.106.79.171 serverIP: 16.245.140.87 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"237.35.44.213","externalIp":"179.22.99.183","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=237.35.44.213 ::: serverIP=179.22.99.183 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T18:10:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612132,\"originType\":\"AD Users\",\"internalIp\":\"237.35.44.213\",\"externalIp\":\"179.22.99.183\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T18:10:31.000Z\"} ::: clientIP=237.35.44.213 ::: serverIP=179.22.99.183 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "237.35.44.213", "serverIP": "179.22.99.183", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"237.35.44.213","externalIp":"179.22.99.183","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=237.35.44.213 ::: serverIP=179.22.99.183 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"237.35.44.213","externalIp":"179.22.99.183","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=237.35.44.213 ::: serverIP=179.22.99.183 ::: userName=johndoe ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T18:10:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 237.35.44.213 serverIP: 179.22.99.183 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"243.230.42.252","externalIp":"167.91.63.105","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=243.230.42.252 ::: serverIP=167.91.63.105 ::: userName=alice ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T18:10:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612132,\"originType\":\"AD Users\",\"internalIp\":\"243.230.42.252\",\"externalIp\":\"167.91.63.105\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T18:10:31.000Z\"} ::: clientIP=243.230.42.252 ::: serverIP=167.91.63.105 ::: userName=alice ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "243.230.42.252", "serverIP": "167.91.63.105", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"243.230.42.252","externalIp":"167.91.63.105","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=243.230.42.252 ::: serverIP=167.91.63.105 ::: userName=alice ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612132,"originType":"AD Users","internalIp":"243.230.42.252","externalIp":"167.91.63.105","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-04T18:10:31.000Z"} ::: clientIP=243.230.42.252 ::: serverIP=167.91.63.105 ::: userName=alice ::: created_at=2022-08-04T18:10:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T18:10:31.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T18:10:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 243.230.42.252 serverIP: 167.91.63.105 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"31.123.114.32","externalIp":"236.58.231.246","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=31.123.114.32 ::: serverIP=236.58.231.246 ::: userName=nighthawk ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T12:27:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"31.123.114.32\",\"externalIp\":\"236.58.231.246\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T12:27:49.000Z\"} ::: clientIP=31.123.114.32 ::: serverIP=236.58.231.246 ::: userName=nighthawk ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "31.123.114.32", "serverIP": "236.58.231.246", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"31.123.114.32","externalIp":"236.58.231.246","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=31.123.114.32 ::: serverIP=236.58.231.246 ::: userName=nighthawk ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"31.123.114.32","externalIp":"236.58.231.246","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=31.123.114.32 ::: serverIP=236.58.231.246 ::: userName=nighthawk ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T12:27:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 31.123.114.32 serverIP: 236.58.231.246 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.210.69.106","externalIp":"143.101.105.217","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=54.210.69.106 ::: serverIP=143.101.105.217 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T12:27:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"54.210.69.106\",\"externalIp\":\"143.101.105.217\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T12:27:49.000Z\"} ::: clientIP=54.210.69.106 ::: serverIP=143.101.105.217 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "54.210.69.106", "serverIP": "143.101.105.217", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.210.69.106","externalIp":"143.101.105.217","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=54.210.69.106 ::: serverIP=143.101.105.217 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"54.210.69.106","externalIp":"143.101.105.217","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=54.210.69.106 ::: serverIP=143.101.105.217 ::: userName=janedoe ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T12:27:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 54.210.69.106 serverIP: 143.101.105.217 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612178,"originType":"AD Users","internalIp":"103.244.221.26","externalIp":"83.244.172.227","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-02T23:43:59.000Z"} ::: clientIP=103.244.221.26 ::: serverIP=83.244.172.227 ::: userName=charlie ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-02T23:43:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612178,\"originType\":\"AD Users\",\"internalIp\":\"103.244.221.26\",\"externalIp\":\"83.244.172.227\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-02T23:43:59.000Z\"} ::: clientIP=103.244.221.26 ::: serverIP=83.244.172.227 ::: userName=charlie ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "103.244.221.26", "serverIP": "83.244.172.227", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612178,"originType":"AD Users","internalIp":"103.244.221.26","externalIp":"83.244.172.227","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-02T23:43:59.000Z"} ::: clientIP=103.244.221.26 ::: serverIP=83.244.172.227 ::: userName=charlie ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612178,"originType":"AD Users","internalIp":"103.244.221.26","externalIp":"83.244.172.227","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-02T23:43:59.000Z"} ::: clientIP=103.244.221.26 ::: serverIP=83.244.172.227 ::: userName=charlie ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-02T23:43:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 103.244.221.26 serverIP: 83.244.172.227 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612178,"originType":"AD Users","internalIp":"129.53.22.52","externalIp":"220.19.156.44","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-02T23:43:59.000Z"} ::: clientIP=129.53.22.52 ::: serverIP=220.19.156.44 ::: userName=nighthawk ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-02T23:43:59.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410612178,\"originType\":\"AD Users\",\"internalIp\":\"129.53.22.52\",\"externalIp\":\"220.19.156.44\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-02T23:43:59.000Z\"} ::: clientIP=129.53.22.52 ::: serverIP=220.19.156.44 ::: userName=nighthawk ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "129.53.22.52", "serverIP": "220.19.156.44", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612178,"originType":"AD Users","internalIp":"129.53.22.52","externalIp":"220.19.156.44","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-02T23:43:59.000Z"} ::: clientIP=129.53.22.52 ::: serverIP=220.19.156.44 ::: userName=nighthawk ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410612178,"originType":"AD Users","internalIp":"129.53.22.52","externalIp":"220.19.156.44","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-02T23:43:59.000Z"} ::: clientIP=129.53.22.52 ::: serverIP=220.19.156.44 ::: userName=nighthawk ::: created_at=2022-06-02T23:43:59.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T23:43:59.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-02T23:43:59.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 129.53.22.52 serverIP: 220.19.156.44 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"144.25.156.228","externalIp":"107.208.208.165","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=144.25.156.228 ::: serverIP=107.208.208.165 ::: userName=johndoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-06T09:52:09.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"144.25.156.228\",\"externalIp\":\"107.208.208.165\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-06T09:52:09.000Z\"} ::: clientIP=144.25.156.228 ::: serverIP=107.208.208.165 ::: userName=johndoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "gwallcheck.api-alliance.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "gwallcheck.api-alliance.com", "vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "144.25.156.228", "serverIP": "107.208.208.165", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"144.25.156.228","externalIp":"107.208.208.165","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=144.25.156.228 ::: serverIP=107.208.208.165 ::: userName=johndoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"144.25.156.228","externalIp":"107.208.208.165","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=144.25.156.228 ::: serverIP=107.208.208.165 ::: userName=johndoe ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-06T09:52:09.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: gwallcheck.api-alliance.com messagetype: firewall_action severitycode: 2 fqdn: gwallcheck.api-alliance.com vendorcode: Business ServicesPotentially HarmfulBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 144.25.156.228 serverIP: 107.208.208.165 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"122.132.67.32","externalIp":"104.189.82.195","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=122.132.67.32 ::: serverIP=104.189.82.195 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-06T09:52:09.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"122.132.67.32\",\"externalIp\":\"104.189.82.195\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-06T09:52:09.000Z\"} ::: clientIP=122.132.67.32 ::: serverIP=104.189.82.195 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "gwallcheck.api-alliance.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "gwallcheck.api-alliance.com", "vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "122.132.67.32", "serverIP": "104.189.82.195", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"122.132.67.32","externalIp":"104.189.82.195","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=122.132.67.32 ::: serverIP=104.189.82.195 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"122.132.67.32","externalIp":"104.189.82.195","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-06T09:52:09.000Z"} ::: clientIP=122.132.67.32 ::: serverIP=104.189.82.195 ::: userName=bob ::: created_at=2022-07-06T09:52:09.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-06T09:52:09.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-06T09:52:09.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: gwallcheck.api-alliance.com messagetype: firewall_action severitycode: 2 fqdn: gwallcheck.api-alliance.com vendorcode: Business ServicesPotentially HarmfulBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 122.132.67.32 serverIP: 104.189.82.195 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"196.226.138.104","externalIp":"182.131.150.182","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=196.226.138.104 ::: serverIP=182.131.150.182 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T12:27:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"196.226.138.104\",\"externalIp\":\"182.131.150.182\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T12:27:49.000Z\"} ::: clientIP=196.226.138.104 ::: serverIP=182.131.150.182 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "196.226.138.104", "serverIP": "182.131.150.182", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"196.226.138.104","externalIp":"182.131.150.182","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=196.226.138.104 ::: serverIP=182.131.150.182 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"196.226.138.104","externalIp":"182.131.150.182","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=196.226.138.104 ::: serverIP=182.131.150.182 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T12:27:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 196.226.138.104 serverIP: 182.131.150.182 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"240.200.84.218","externalIp":"80.243.78.139","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=240.200.84.218 ::: serverIP=80.243.78.139 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T12:27:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"240.200.84.218\",\"externalIp\":\"80.243.78.139\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"www.viabtc.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T12:27:49.000Z\"} ::: clientIP=240.200.84.218 ::: serverIP=80.243.78.139 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.viabtc.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.viabtc.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "240.200.84.218", "serverIP": "80.243.78.139", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"240.200.84.218","externalIp":"80.243.78.139","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=240.200.84.218 ::: serverIP=80.243.78.139 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.viabtc.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"240.200.84.218","externalIp":"80.243.78.139","categories":["Cryptomining"],"tags":[],"destination":"www.viabtc.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T12:27:49.000Z"} ::: clientIP=240.200.84.218 ::: serverIP=80.243.78.139 ::: userName=bob ::: created_at=2022-08-04T12:27:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T12:27:49.000Z ::: serverHostname=www.viabtc.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T12:27:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.viabtc.com messagetype: firewall_action severitycode: 2 fqdn: www.viabtc.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 240.200.84.218 serverIP: 80.243.78.139 userName: bob
Explain this syslog message
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=87.61.49.229 dst=132.114.255.162 protocol=tcp sport=55009 dport=443 decision=blocked
{ "action": "block", "clientport": 55009, "message": "<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=87.61.49.229 dst=132.114.255.162 protocol=tcp sport=55009 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "87.61.49.229", "serverIP": "132.114.255.162" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=87.61.49.229 dst=132.114.255.162 protocol=tcp sport=55009 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=87.61.49.229 dst=132.114.255.162 protocol=tcp sport=55009 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 55009 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 87.61.49.229 serverIP: 132.114.255.162
Explain this syslog message
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=214.60.129.86 dst=66.107.204.112 protocol=tcp sport=55009 dport=443 decision=blocked
{ "action": "block", "clientport": 55009, "message": "<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=214.60.129.86 dst=66.107.204.112 protocol=tcp sport=55009 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "214.60.129.86", "serverIP": "66.107.204.112" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=214.60.129.86 dst=66.107.204.112 protocol=tcp sport=55009 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=214.60.129.86 dst=66.107.204.112 protocol=tcp sport=55009 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 55009 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 214.60.129.86 serverIP: 66.107.204.112
Explain this syslog message
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=204.137.163.249 dst=86.158.223.96 protocol=tcp sport=55009 dport=443 decision=blocked
{ "action": "block", "clientport": 55009, "message": "<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=204.137.163.249 dst=86.158.223.96 protocol=tcp sport=55009 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "204.137.163.249", "serverIP": "86.158.223.96" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=204.137.163.249 dst=86.158.223.96 protocol=tcp sport=55009 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=204.137.163.249 dst=86.158.223.96 protocol=tcp sport=55009 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 55009 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 204.137.163.249 serverIP: 86.158.223.96
Explain this syslog message
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=19.95.159.38 dst=249.223.168.37 protocol=tcp sport=55009 dport=443 decision=blocked
{ "action": "block", "clientport": 55009, "message": "<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=19.95.159.38 dst=249.223.168.37 protocol=tcp sport=55009 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "19.95.159.38", "serverIP": "249.223.168.37" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=19.95.159.38 dst=249.223.168.37 protocol=tcp sport=55009 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1686743813.048750516 M61_MX67C_Savannah l7_firewall src=19.95.159.38 dst=249.223.168.37 protocol=tcp sport=55009 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 55009 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 19.95.159.38 serverIP: 249.223.168.37
Explain this syslog message
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=64.31.195.41 dst=190.156.248.127 protocol=tcp sport=57759 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=64.31.195.41 dst=190.156.248.127 protocol=tcp sport=57759 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57759, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "64.31.195.41", "serverIP": "190.156.248.127" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=64.31.195.41 dst=190.156.248.127 protocol=tcp sport=57759 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=64.31.195.41 dst=190.156.248.127 protocol=tcp sport=57759 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57759 protocol: 6 streamName: meraki_l7_firewall clientIP: 64.31.195.41 serverIP: 190.156.248.127
Explain this syslog message
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=40.157.98.119 dst=95.9.239.237 protocol=tcp sport=57759 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=40.157.98.119 dst=95.9.239.237 protocol=tcp sport=57759 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57759, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "40.157.98.119", "serverIP": "95.9.239.237" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=40.157.98.119 dst=95.9.239.237 protocol=tcp sport=57759 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=40.157.98.119 dst=95.9.239.237 protocol=tcp sport=57759 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57759 protocol: 6 streamName: meraki_l7_firewall clientIP: 40.157.98.119 serverIP: 95.9.239.237
Explain this syslog message
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=179.156.72.133 dst=101.225.78.80 protocol=tcp sport=57759 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=179.156.72.133 dst=101.225.78.80 protocol=tcp sport=57759 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57759, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "179.156.72.133", "serverIP": "101.225.78.80" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=179.156.72.133 dst=101.225.78.80 protocol=tcp sport=57759 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=179.156.72.133 dst=101.225.78.80 protocol=tcp sport=57759 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57759 protocol: 6 streamName: meraki_l7_firewall clientIP: 179.156.72.133 serverIP: 101.225.78.80
Explain this syslog message
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=17.96.29.64 dst=226.219.49.32 protocol=tcp sport=57759 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=17.96.29.64 dst=226.219.49.32 protocol=tcp sport=57759 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57759, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "17.96.29.64", "serverIP": "226.219.49.32" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=17.96.29.64 dst=226.219.49.32 protocol=tcp sport=57759 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1679451184.186720314 NORDC_MX400_1 l7_firewall src=17.96.29.64 dst=226.219.49.32 protocol=tcp sport=57759 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57759 protocol: 6 streamName: meraki_l7_firewall clientIP: 17.96.29.64 serverIP: 226.219.49.32
Explain this syslog message
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=53.11.117.133 dst=59.79.186.80 protocol=tcp sport=55911 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=53.11.117.133 dst=59.79.186.80 protocol=tcp sport=55911 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 55911, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "53.11.117.133", "serverIP": "59.79.186.80" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=53.11.117.133 dst=59.79.186.80 protocol=tcp sport=55911 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=53.11.117.133 dst=59.79.186.80 protocol=tcp sport=55911 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 55911 protocol: 6 streamName: meraki_l7_firewall clientIP: 53.11.117.133 serverIP: 59.79.186.80
Explain this syslog message
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=27.211.210.181 dst=245.219.164.103 protocol=tcp sport=55911 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=27.211.210.181 dst=245.219.164.103 protocol=tcp sport=55911 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 55911, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "27.211.210.181", "serverIP": "245.219.164.103" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=27.211.210.181 dst=245.219.164.103 protocol=tcp sport=55911 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=27.211.210.181 dst=245.219.164.103 protocol=tcp sport=55911 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 55911 protocol: 6 streamName: meraki_l7_firewall clientIP: 27.211.210.181 serverIP: 245.219.164.103
Explain this syslog message
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=76.202.181.191 dst=57.65.176.42 protocol=tcp sport=55911 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=76.202.181.191 dst=57.65.176.42 protocol=tcp sport=55911 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 55911, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "76.202.181.191", "serverIP": "57.65.176.42" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=76.202.181.191 dst=57.65.176.42 protocol=tcp sport=55911 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=76.202.181.191 dst=57.65.176.42 protocol=tcp sport=55911 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 55911 protocol: 6 streamName: meraki_l7_firewall clientIP: 76.202.181.191 serverIP: 57.65.176.42
Explain this syslog message
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=149.130.48.244 dst=227.46.171.146 protocol=tcp sport=55911 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=149.130.48.244 dst=227.46.171.146 protocol=tcp sport=55911 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 55911, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "149.130.48.244", "serverIP": "227.46.171.146" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=149.130.48.244 dst=227.46.171.146 protocol=tcp sport=55911 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1679451197.491771563 NORDC_MX400_1 l7_firewall src=149.130.48.244 dst=227.46.171.146 protocol=tcp sport=55911 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 55911 protocol: 6 streamName: meraki_l7_firewall clientIP: 149.130.48.244 serverIP: 227.46.171.146
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attacmement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_acme.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@acme.bank"],"senderIP":"9.253.98.29","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=9.253.98.29 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=9.253.98.29 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "stephan.witolla@jobticket.de", "emailsendingserver": "212.227.126.135", "emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "filehash": "<169334821164.8788.14712446091347986247@jobticket.de>", "filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attacmement\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attacmement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attacmeed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_acme.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@acme.bank\"],\"senderIP\":\"9.253.98.29\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=9.253.98.29 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=9.253.98.29 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T22:31:33.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "9.253.98.29" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attacmement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_acme.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@acme.bank"],"senderIP":"9.253.98.29","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=9.253.98.29 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=9.253.98.29 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attacmement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attacmeed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_acme.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@acme.bank"],"senderIP":"9.253.98.29","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=9.253.98.29 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=9.253.98.29 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: stephan.witolla@jobticket.de emailsendingserver: 212.227.126.135 emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM filehash: <169334821164.8788.14712446091347986247@jobticket.de> filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-29T22:31:33.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 9.253.98.29
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"133.27.175.167","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=133.27.175.167 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=133.27.175.167 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "stephan.witolla@jobticket.de", "emailsendingserver": "212.227.126.135", "emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "filehash": "<169334821164.8788.14712446091347986247@jobticket.de>", "filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attwayneed\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_wayne.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@wayne.bank\"],\"senderIP\":\"133.27.175.167\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=133.27.175.167 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=133.27.175.167 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T22:31:33.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "133.27.175.167" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"133.27.175.167","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=133.27.175.167 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=133.27.175.167 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attwayneed","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_wayne.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@wayne.bank"],"senderIP":"133.27.175.167","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=133.27.175.167 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=133.27.175.167 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: stephan.witolla@jobticket.de emailsendingserver: 212.227.126.135 emailsubject: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM filehash: <169334821164.8788.14712446091347986247@jobticket.de> filename: from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-08-29T22:31:33.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 133.27.175.167
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_stark.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@stark.bank"],"senderIP":"21.121.135.254","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=21.121.135.254 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=21.121.135.254 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "stephan.witolla@jobticket.de", "emailsendingserver": "212.227.126.135", "emailsubject": "FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "filehash": "<169334821164.8788.14712446091347986247@jobticket.de>", "filename": "from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"threatTime\":\"2023-08-29T22:30:30.000Z\",\"threat\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2023-08-29T22:31:33.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":64324,\"headerFrom\":\"\\\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\\\" <stephan.witolla@jobticket.de>\",\"headerReplyTo\":null,\"fromAddress\":[\"stephan.witolla@jobticket.de\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"security@Calprivate.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attstarked\",\"sha256\":\"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4\",\"md5\":\"9d613f0f93cda7c1b477392ffdfd7252\",\"filename\":\"w9&statement_advice_for_stark.html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"},{\"disposition\":\"inline\",\"sha256\":\"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b\",\"md5\":\"04a8c8326c207e11ad625ad34ea4bbdc\",\"filename\":\"text.html\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"5c7279e3-0777-8f66-3926-f216efc6f7e1\",\"QID\":\"3sqfsc1d7h-1\",\"GUID\":\"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv\",\"sender\":\"stephan.witolla@jobticket.de\",\"recipient\":[\"security@stark.bank\"],\"senderIP\":\"21.121.135.254\",\"messageID\":\"<169334821164.8788.14712446091347986247@jobticket.de>\"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=21.121.135.254 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=21.121.135.254 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T22:31:33.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "21.121.135.254" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","threatTime":"2023-08-29T22:30:30.000Z","threat":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2023-08-29T22:31:33.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","spf","sandbox","spam","dmarc","urldefense"],"messageSize":64324,"headerFrom":"\"AP Inquiries_MAILBOXACCOUNTSPAYABLE@Calprivate\" <stephan.witolla@jobticket.de>","headerReplyTo":null,"fromAddress":["stephan.witolla@jobticket.de"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["security@Calprivate.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"c2a908c9ca86fd2592b470b72aca5809114811a221506c6ce97dabf2065d4bb4","md5":"9d613f0f93cda7c1b477392ffdfd7252","filename":"w9&statement_advice_for_stark.html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"},{"disposition":"inline","sha256":"2c70e331ae843595a68283f2fe61b2d0fc2663bf73aa3ff5eb788dd88b884d3b","md5":"04a8c8326c207e11ad625ad34ea4bbdc","filename":"text.html","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"5c7279e3-0777-8f66-3926-f216efc6f7e1","QID":"3sqfsc1d7h-1","GUID":"w2R6kx3kMblgVlxLXZUBG9hTUJBq3wFv","sender":"stephan.witolla@jobticket.de","recipient":["security@stark.bank"],"senderIP":"21.121.135.254","messageID":"<169334821164.8788.14712446091347986247@jobticket.de>"} ::: fileHash=<169334821164.8788.14712446091347986247@jobticket.de> ::: fileName=from: stephan.witolla@jobticket.de subj: FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: serverIP=21.121.135.254 ::: emailFrom=stephan.witolla@jobticket.de ::: created_at=2023-08-29T22:31:33.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=FW:Statement & w9 -Ref #611198038_on Tuesday-August-2023 15:30 PM ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-08-29T22:31:33.000Z ::: emailSendingServer=21.121.135.254 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message