input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=53.14.169.131 dst=176.210.22.158 protocol=udp sport=54650 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=53.14.169.131 dst=176.210.22.158 protocol=udp sport=54650 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54650 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 53.14.169.131 serverIP: 176.210.22.158
Explain this syslog message
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=213.178.26.8 dst=139.65.108.179 protocol=udp sport=54650 dport=53 decision=blocked
{ "action": "block", "clientport": 54650, "message": "<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=213.178.26.8 dst=139.65.108.179 protocol=udp sport=54650 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "213.178.26.8", "serverIP": "139.65.108.179" }
Create a JSON artifact from the message
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=213.178.26.8 dst=139.65.108.179 protocol=udp sport=54650 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=213.178.26.8 dst=139.65.108.179 protocol=udp sport=54650 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54650 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 213.178.26.8 serverIP: 139.65.108.179
Explain this syslog message
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=49.73.217.238 dst=162.152.136.52 protocol=udp sport=54137 dport=53 decision=blocked
{ "action": "block", "clientport": 54137, "message": "<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=49.73.217.238 dst=162.152.136.52 protocol=udp sport=54137 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "49.73.217.238", "serverIP": "162.152.136.52" }
Create a JSON artifact from the message
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=49.73.217.238 dst=162.152.136.52 protocol=udp sport=54137 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=49.73.217.238 dst=162.152.136.52 protocol=udp sport=54137 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54137 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 49.73.217.238 serverIP: 162.152.136.52
Explain this syslog message
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=111.124.45.73 dst=208.176.126.9 protocol=udp sport=54137 dport=53 decision=blocked
{ "action": "block", "clientport": 54137, "message": "<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=111.124.45.73 dst=208.176.126.9 protocol=udp sport=54137 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "111.124.45.73", "serverIP": "208.176.126.9" }
Create a JSON artifact from the message
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=111.124.45.73 dst=208.176.126.9 protocol=udp sport=54137 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=111.124.45.73 dst=208.176.126.9 protocol=udp sport=54137 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54137 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 111.124.45.73 serverIP: 208.176.126.9
Explain this syslog message
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=104.205.99.74 dst=150.142.5.238 protocol=udp sport=54137 dport=53 decision=blocked
{ "action": "block", "clientport": 54137, "message": "<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=104.205.99.74 dst=150.142.5.238 protocol=udp sport=54137 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "104.205.99.74", "serverIP": "150.142.5.238" }
Create a JSON artifact from the message
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=104.205.99.74 dst=150.142.5.238 protocol=udp sport=54137 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=104.205.99.74 dst=150.142.5.238 protocol=udp sport=54137 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54137 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 104.205.99.74 serverIP: 150.142.5.238
Explain this syslog message
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=137.106.87.16 dst=145.127.28.75 protocol=udp sport=54137 dport=53 decision=blocked
{ "action": "block", "clientport": 54137, "message": "<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=137.106.87.16 dst=145.127.28.75 protocol=udp sport=54137 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "137.106.87.16", "serverIP": "145.127.28.75" }
Create a JSON artifact from the message
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=137.106.87.16 dst=145.127.28.75 protocol=udp sport=54137 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=137.106.87.16 dst=145.127.28.75 protocol=udp sport=54137 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54137 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 137.106.87.16 serverIP: 145.127.28.75
Explain this syslog message
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=152.136.235.128 dst=33.107.104.107 protocol=udp sport=54650 dport=53 decision=blocked
{ "action": "block", "clientport": 54650, "message": "<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=152.136.235.128 dst=33.107.104.107 protocol=udp sport=54650 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "152.136.235.128", "serverIP": "33.107.104.107" }
Create a JSON artifact from the message
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=152.136.235.128 dst=33.107.104.107 protocol=udp sport=54650 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=152.136.235.128 dst=33.107.104.107 protocol=udp sport=54650 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54650 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 152.136.235.128 serverIP: 33.107.104.107
Explain this syslog message
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=237.239.153.61 dst=20.131.109.40 protocol=udp sport=54650 dport=53 decision=blocked
{ "action": "block", "clientport": 54650, "message": "<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=237.239.153.61 dst=20.131.109.40 protocol=udp sport=54650 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "237.239.153.61", "serverIP": "20.131.109.40" }
Create a JSON artifact from the message
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=237.239.153.61 dst=20.131.109.40 protocol=udp sport=54650 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=237.239.153.61 dst=20.131.109.40 protocol=udp sport=54650 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54650 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 237.239.153.61 serverIP: 20.131.109.40
Explain this syslog message
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=249.79.240.41 dst=168.70.173.242 protocol=udp sport=54137 dport=53 decision=blocked
{ "action": "block", "clientport": 54137, "message": "<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=249.79.240.41 dst=168.70.173.242 protocol=udp sport=54137 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "249.79.240.41", "serverIP": "168.70.173.242" }
Create a JSON artifact from the message
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=249.79.240.41 dst=168.70.173.242 protocol=udp sport=54137 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=249.79.240.41 dst=168.70.173.242 protocol=udp sport=54137 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54137 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 249.79.240.41 serverIP: 168.70.173.242
Explain this syslog message
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=248.112.181.12 dst=55.133.166.171 protocol=udp sport=54137 dport=53 decision=blocked
{ "action": "block", "clientport": 54137, "message": "<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=248.112.181.12 dst=55.133.166.171 protocol=udp sport=54137 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "248.112.181.12", "serverIP": "55.133.166.171" }
Create a JSON artifact from the message
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=248.112.181.12 dst=55.133.166.171 protocol=udp sport=54137 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=248.112.181.12 dst=55.133.166.171 protocol=udp sport=54137 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54137 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 248.112.181.12 serverIP: 55.133.166.171
Explain this syslog message
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=239.164.161.19 dst=254.230.174.18 protocol=udp sport=54137 dport=53 decision=blocked
{ "action": "block", "clientport": 54137, "message": "<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=239.164.161.19 dst=254.230.174.18 protocol=udp sport=54137 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "239.164.161.19", "serverIP": "254.230.174.18" }
Create a JSON artifact from the message
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=239.164.161.19 dst=254.230.174.18 protocol=udp sport=54137 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=239.164.161.19 dst=254.230.174.18 protocol=udp sport=54137 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54137 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 239.164.161.19 serverIP: 254.230.174.18
Explain this syslog message
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=244.27.120.102 dst=17.13.119.152 protocol=udp sport=54137 dport=53 decision=blocked
{ "action": "block", "clientport": 54137, "message": "<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=244.27.120.102 dst=17.13.119.152 protocol=udp sport=54137 dport=53 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 53, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "244.27.120.102", "serverIP": "17.13.119.152" }
Create a JSON artifact from the message
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=244.27.120.102 dst=17.13.119.152 protocol=udp sport=54137 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=244.27.120.102 dst=17.13.119.152 protocol=udp sport=54137 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 54137 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 53 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 244.27.120.102 serverIP: 17.13.119.152
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"235.185.135.108","externalIp":"195.110.210.172","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=235.185.135.108 ::: serverIP=195.110.210.172 ::: userName=charlie ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-07T14:49:40.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"235.185.135.108\",\"externalIp\":\"195.110.210.172\",\"categories\":[\"Malware\",\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-07T14:49:40.000Z\"} ::: clientIP=235.185.135.108 ::: serverIP=195.110.210.172 ::: userName=charlie ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "MalwarePhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "235.185.135.108", "serverIP": "195.110.210.172", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"235.185.135.108","externalIp":"195.110.210.172","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=235.185.135.108 ::: serverIP=195.110.210.172 ::: userName=charlie ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"235.185.135.108","externalIp":"195.110.210.172","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=235.185.135.108 ::: serverIP=195.110.210.172 ::: userName=charlie ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-07T14:49:40.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: MalwarePhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 235.185.135.108 serverIP: 195.110.210.172 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"236.125.137.27","externalIp":"9.103.136.1","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=236.125.137.27 ::: serverIP=9.103.136.1 ::: userName=nighthawk ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-07T14:49:40.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"236.125.137.27\",\"externalIp\":\"9.103.136.1\",\"categories\":[\"Malware\",\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-07T14:49:40.000Z\"} ::: clientIP=236.125.137.27 ::: serverIP=9.103.136.1 ::: userName=nighthawk ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "MalwarePhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "236.125.137.27", "serverIP": "9.103.136.1", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"236.125.137.27","externalIp":"9.103.136.1","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=236.125.137.27 ::: serverIP=9.103.136.1 ::: userName=nighthawk ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"236.125.137.27","externalIp":"9.103.136.1","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=236.125.137.27 ::: serverIP=9.103.136.1 ::: userName=nighthawk ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-07T14:49:40.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: MalwarePhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 236.125.137.27 serverIP: 9.103.136.1 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"158.51.128.82","externalIp":"245.189.245.97","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=158.51.128.82 ::: serverIP=245.189.245.97 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-07T14:49:40.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"158.51.128.82\",\"externalIp\":\"245.189.245.97\",\"categories\":[\"Malware\",\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-07T14:49:40.000Z\"} ::: clientIP=158.51.128.82 ::: serverIP=245.189.245.97 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "MalwarePhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "158.51.128.82", "serverIP": "245.189.245.97", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"158.51.128.82","externalIp":"245.189.245.97","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=158.51.128.82 ::: serverIP=245.189.245.97 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"158.51.128.82","externalIp":"245.189.245.97","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=158.51.128.82 ::: serverIP=245.189.245.97 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-07T14:49:40.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: MalwarePhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 158.51.128.82 serverIP: 245.189.245.97 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"71.110.28.188","externalIp":"185.231.85.155","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=71.110.28.188 ::: serverIP=185.231.85.155 ::: userName=alice ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-07T14:49:40.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"71.110.28.188\",\"externalIp\":\"185.231.85.155\",\"categories\":[\"Malware\",\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-07T14:49:40.000Z\"} ::: clientIP=71.110.28.188 ::: serverIP=185.231.85.155 ::: userName=alice ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "MalwarePhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "71.110.28.188", "serverIP": "185.231.85.155", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"71.110.28.188","externalIp":"185.231.85.155","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=71.110.28.188 ::: serverIP=185.231.85.155 ::: userName=alice ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"71.110.28.188","externalIp":"185.231.85.155","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=71.110.28.188 ::: serverIP=185.231.85.155 ::: userName=alice ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-07T14:49:40.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: MalwarePhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 71.110.28.188 serverIP: 185.231.85.155 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"216.175.130.32","externalIp":"32.251.21.39","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=216.175.130.32 ::: serverIP=32.251.21.39 ::: userName=johndoe ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-07T14:49:40.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"216.175.130.32\",\"externalIp\":\"32.251.21.39\",\"categories\":[\"Malware\",\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-07T14:49:40.000Z\"} ::: clientIP=216.175.130.32 ::: serverIP=32.251.21.39 ::: userName=johndoe ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "MalwarePhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "216.175.130.32", "serverIP": "32.251.21.39", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"216.175.130.32","externalIp":"32.251.21.39","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=216.175.130.32 ::: serverIP=32.251.21.39 ::: userName=johndoe ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"216.175.130.32","externalIp":"32.251.21.39","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=216.175.130.32 ::: serverIP=32.251.21.39 ::: userName=johndoe ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-07T14:49:40.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: MalwarePhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 216.175.130.32 serverIP: 32.251.21.39 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"219.28.36.190","externalIp":"215.69.76.132","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=219.28.36.190 ::: serverIP=215.69.76.132 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-07T14:49:40.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"219.28.36.190\",\"externalIp\":\"215.69.76.132\",\"categories\":[\"Malware\",\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-07T14:49:40.000Z\"} ::: clientIP=219.28.36.190 ::: serverIP=215.69.76.132 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "MalwarePhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "219.28.36.190", "serverIP": "215.69.76.132", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"219.28.36.190","externalIp":"215.69.76.132","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=219.28.36.190 ::: serverIP=215.69.76.132 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"219.28.36.190","externalIp":"215.69.76.132","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=219.28.36.190 ::: serverIP=215.69.76.132 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-07T14:49:40.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: MalwarePhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 219.28.36.190 serverIP: 215.69.76.132 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"180.78.123.198","externalIp":"158.227.164.63","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=180.78.123.198 ::: serverIP=158.227.164.63 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-02T15:11:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"180.78.123.198\",\"externalIp\":\"158.227.164.63\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T15:11:30.000Z\"} ::: clientIP=180.78.123.198 ::: serverIP=158.227.164.63 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "180.78.123.198", "serverIP": "158.227.164.63", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"180.78.123.198","externalIp":"158.227.164.63","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=180.78.123.198 ::: serverIP=158.227.164.63 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"180.78.123.198","externalIp":"158.227.164.63","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=180.78.123.198 ::: serverIP=158.227.164.63 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-02T15:11:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 180.78.123.198 serverIP: 158.227.164.63 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"183.70.184.32","externalIp":"75.13.80.139","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=183.70.184.32 ::: serverIP=75.13.80.139 ::: userName=janedoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-02T15:11:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"183.70.184.32\",\"externalIp\":\"75.13.80.139\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T15:11:30.000Z\"} ::: clientIP=183.70.184.32 ::: serverIP=75.13.80.139 ::: userName=janedoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "183.70.184.32", "serverIP": "75.13.80.139", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"183.70.184.32","externalIp":"75.13.80.139","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=183.70.184.32 ::: serverIP=75.13.80.139 ::: userName=janedoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"183.70.184.32","externalIp":"75.13.80.139","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=183.70.184.32 ::: serverIP=75.13.80.139 ::: userName=janedoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-02T15:11:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 183.70.184.32 serverIP: 75.13.80.139 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"119.80.14.132","externalIp":"73.202.26.156","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=119.80.14.132 ::: serverIP=73.202.26.156 ::: userName=johndoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-03T13:20:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"119.80.14.132\",\"externalIp\":\"73.202.26.156\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-03T13:20:56.000Z\"} ::: clientIP=119.80.14.132 ::: serverIP=73.202.26.156 ::: userName=johndoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "119.80.14.132", "serverIP": "73.202.26.156", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"119.80.14.132","externalIp":"73.202.26.156","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=119.80.14.132 ::: serverIP=73.202.26.156 ::: userName=johndoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"119.80.14.132","externalIp":"73.202.26.156","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=119.80.14.132 ::: serverIP=73.202.26.156 ::: userName=johndoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-03T13:20:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 119.80.14.132 serverIP: 73.202.26.156 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"140.22.82.138","externalIp":"170.195.130.19","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=140.22.82.138 ::: serverIP=170.195.130.19 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-03T13:20:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"140.22.82.138\",\"externalIp\":\"170.195.130.19\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-03T13:20:56.000Z\"} ::: clientIP=140.22.82.138 ::: serverIP=170.195.130.19 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "140.22.82.138", "serverIP": "170.195.130.19", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"140.22.82.138","externalIp":"170.195.130.19","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=140.22.82.138 ::: serverIP=170.195.130.19 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"140.22.82.138","externalIp":"170.195.130.19","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=140.22.82.138 ::: serverIP=170.195.130.19 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-03T13:20:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 140.22.82.138 serverIP: 170.195.130.19 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"244.249.97.15","externalIp":"137.154.221.11","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=244.249.97.15 ::: serverIP=137.154.221.11 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-02T15:11:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"244.249.97.15\",\"externalIp\":\"137.154.221.11\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T15:11:30.000Z\"} ::: clientIP=244.249.97.15 ::: serverIP=137.154.221.11 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "244.249.97.15", "serverIP": "137.154.221.11", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"244.249.97.15","externalIp":"137.154.221.11","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=244.249.97.15 ::: serverIP=137.154.221.11 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"244.249.97.15","externalIp":"137.154.221.11","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=244.249.97.15 ::: serverIP=137.154.221.11 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-02T15:11:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 244.249.97.15 serverIP: 137.154.221.11 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"28.80.253.139","externalIp":"66.69.215.48","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=28.80.253.139 ::: serverIP=66.69.215.48 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-02T15:11:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"28.80.253.139\",\"externalIp\":\"66.69.215.48\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T15:11:30.000Z\"} ::: clientIP=28.80.253.139 ::: serverIP=66.69.215.48 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "28.80.253.139", "serverIP": "66.69.215.48", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"28.80.253.139","externalIp":"66.69.215.48","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=28.80.253.139 ::: serverIP=66.69.215.48 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"28.80.253.139","externalIp":"66.69.215.48","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=28.80.253.139 ::: serverIP=66.69.215.48 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-02T15:11:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 28.80.253.139 serverIP: 66.69.215.48 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"172.76.118.108","externalIp":"229.116.84.24","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=172.76.118.108 ::: serverIP=229.116.84.24 ::: userName=nighthawk ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-03T13:20:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"172.76.118.108\",\"externalIp\":\"229.116.84.24\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-03T13:20:56.000Z\"} ::: clientIP=172.76.118.108 ::: serverIP=229.116.84.24 ::: userName=nighthawk ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "172.76.118.108", "serverIP": "229.116.84.24", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"172.76.118.108","externalIp":"229.116.84.24","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=172.76.118.108 ::: serverIP=229.116.84.24 ::: userName=nighthawk ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"172.76.118.108","externalIp":"229.116.84.24","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=172.76.118.108 ::: serverIP=229.116.84.24 ::: userName=nighthawk ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-03T13:20:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 172.76.118.108 serverIP: 229.116.84.24 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.1.181.167","externalIp":"160.129.248.1","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=44.1.181.167 ::: serverIP=160.129.248.1 ::: userName=janedoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-03T13:20:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"44.1.181.167\",\"externalIp\":\"160.129.248.1\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-03T13:20:56.000Z\"} ::: clientIP=44.1.181.167 ::: serverIP=160.129.248.1 ::: userName=janedoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "44.1.181.167", "serverIP": "160.129.248.1", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.1.181.167","externalIp":"160.129.248.1","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=44.1.181.167 ::: serverIP=160.129.248.1 ::: userName=janedoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.1.181.167","externalIp":"160.129.248.1","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=44.1.181.167 ::: serverIP=160.129.248.1 ::: userName=janedoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-03T13:20:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 44.1.181.167 serverIP: 160.129.248.1 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"134.20.20.112","externalIp":"185.194.151.178","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=134.20.20.112 ::: serverIP=185.194.151.178 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-02T15:11:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"134.20.20.112\",\"externalIp\":\"185.194.151.178\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T15:11:30.000Z\"} ::: clientIP=134.20.20.112 ::: serverIP=185.194.151.178 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "134.20.20.112", "serverIP": "185.194.151.178", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"134.20.20.112","externalIp":"185.194.151.178","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=134.20.20.112 ::: serverIP=185.194.151.178 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"134.20.20.112","externalIp":"185.194.151.178","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=134.20.20.112 ::: serverIP=185.194.151.178 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-02T15:11:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 134.20.20.112 serverIP: 185.194.151.178 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"120.149.218.37","externalIp":"132.62.160.44","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=120.149.218.37 ::: serverIP=132.62.160.44 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-02T15:11:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"120.149.218.37\",\"externalIp\":\"132.62.160.44\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T15:11:30.000Z\"} ::: clientIP=120.149.218.37 ::: serverIP=132.62.160.44 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "120.149.218.37", "serverIP": "132.62.160.44", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"120.149.218.37","externalIp":"132.62.160.44","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=120.149.218.37 ::: serverIP=132.62.160.44 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"120.149.218.37","externalIp":"132.62.160.44","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=120.149.218.37 ::: serverIP=132.62.160.44 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-02T15:11:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 120.149.218.37 serverIP: 132.62.160.44 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"215.123.37.132","externalIp":"33.201.104.14","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=215.123.37.132 ::: serverIP=33.201.104.14 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-03T13:20:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"215.123.37.132\",\"externalIp\":\"33.201.104.14\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-03T13:20:56.000Z\"} ::: clientIP=215.123.37.132 ::: serverIP=33.201.104.14 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "215.123.37.132", "serverIP": "33.201.104.14", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"215.123.37.132","externalIp":"33.201.104.14","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=215.123.37.132 ::: serverIP=33.201.104.14 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"215.123.37.132","externalIp":"33.201.104.14","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=215.123.37.132 ::: serverIP=33.201.104.14 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-03T13:20:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 215.123.37.132 serverIP: 33.201.104.14 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"47.60.47.159","externalIp":"91.48.63.174","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=47.60.47.159 ::: serverIP=91.48.63.174 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-02-03T13:20:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"47.60.47.159\",\"externalIp\":\"91.48.63.174\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-03T13:20:56.000Z\"} ::: clientIP=47.60.47.159 ::: serverIP=91.48.63.174 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ramsinvesting.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ramsinvesting.com", "vendorcode": "PhishingBlock ListReal Estate", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "47.60.47.159", "serverIP": "91.48.63.174", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"47.60.47.159","externalIp":"91.48.63.174","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=47.60.47.159 ::: serverIP=91.48.63.174 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"47.60.47.159","externalIp":"91.48.63.174","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=47.60.47.159 ::: serverIP=91.48.63.174 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-02-03T13:20:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ramsinvesting.com messagetype: firewall_action severitycode: 2 fqdn: ramsinvesting.com vendorcode: PhishingBlock ListReal Estate action: block streamName: OpenDNS Detection clientIP: 47.60.47.159 serverIP: 91.48.63.174 userName: fish
Explain this syslog message
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=62.74.82.22 dst=148.165.179.111 protocol=tcp sport=57882 dport=443 decision=blocked
{ "action": "block", "clientport": 57882, "message": "<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=62.74.82.22 dst=148.165.179.111 protocol=tcp sport=57882 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "62.74.82.22", "serverIP": "148.165.179.111" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=62.74.82.22 dst=148.165.179.111 protocol=tcp sport=57882 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=62.74.82.22 dst=148.165.179.111 protocol=tcp sport=57882 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57882 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 62.74.82.22 serverIP: 148.165.179.111
Explain this syslog message
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=161.247.205.112 dst=253.74.163.136 protocol=tcp sport=57882 dport=443 decision=blocked
{ "action": "block", "clientport": 57882, "message": "<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=161.247.205.112 dst=253.74.163.136 protocol=tcp sport=57882 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "161.247.205.112", "serverIP": "253.74.163.136" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=161.247.205.112 dst=253.74.163.136 protocol=tcp sport=57882 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=161.247.205.112 dst=253.74.163.136 protocol=tcp sport=57882 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57882 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 161.247.205.112 serverIP: 253.74.163.136
Explain this syslog message
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=27.29.28.67 dst=128.184.94.189 protocol=tcp sport=57882 dport=443 decision=blocked
{ "action": "block", "clientport": 57882, "message": "<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=27.29.28.67 dst=128.184.94.189 protocol=tcp sport=57882 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "27.29.28.67", "serverIP": "128.184.94.189" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=27.29.28.67 dst=128.184.94.189 protocol=tcp sport=57882 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=27.29.28.67 dst=128.184.94.189 protocol=tcp sport=57882 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57882 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 27.29.28.67 serverIP: 128.184.94.189
Explain this syslog message
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=122.70.19.129 dst=27.220.86.221 protocol=tcp sport=57882 dport=443 decision=blocked
{ "action": "block", "clientport": 57882, "message": "<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=122.70.19.129 dst=27.220.86.221 protocol=tcp sport=57882 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "122.70.19.129", "serverIP": "27.220.86.221" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=122.70.19.129 dst=27.220.86.221 protocol=tcp sport=57882 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message