input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=53.14.169.131 dst=176.210.22.158 protocol=udp sport=54650 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=53.14.169.131 dst=176.210.22.158 protocol=udp sport=54650 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54650
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 53.14.169.131
serverIP: 176.210.22.158 | Explain this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=213.178.26.8 dst=139.65.108.179 protocol=udp sport=54650 dport=53 decision=blocked | {
"action": "block",
"clientport": 54650,
"message": "<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=213.178.26.8 dst=139.65.108.179 protocol=udp sport=54650 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "213.178.26.8",
"serverIP": "139.65.108.179"
} | Create a JSON artifact from the message |
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=213.178.26.8 dst=139.65.108.179 protocol=udp sport=54650 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=213.178.26.8 dst=139.65.108.179 protocol=udp sport=54650 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54650
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 213.178.26.8
serverIP: 139.65.108.179 | Explain this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=49.73.217.238 dst=162.152.136.52 protocol=udp sport=54137 dport=53 decision=blocked | {
"action": "block",
"clientport": 54137,
"message": "<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=49.73.217.238 dst=162.152.136.52 protocol=udp sport=54137 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "49.73.217.238",
"serverIP": "162.152.136.52"
} | Create a JSON artifact from the message |
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=49.73.217.238 dst=162.152.136.52 protocol=udp sport=54137 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=49.73.217.238 dst=162.152.136.52 protocol=udp sport=54137 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54137
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 49.73.217.238
serverIP: 162.152.136.52 | Explain this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=111.124.45.73 dst=208.176.126.9 protocol=udp sport=54137 dport=53 decision=blocked | {
"action": "block",
"clientport": 54137,
"message": "<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=111.124.45.73 dst=208.176.126.9 protocol=udp sport=54137 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "111.124.45.73",
"serverIP": "208.176.126.9"
} | Create a JSON artifact from the message |
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=111.124.45.73 dst=208.176.126.9 protocol=udp sport=54137 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=111.124.45.73 dst=208.176.126.9 protocol=udp sport=54137 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54137
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 111.124.45.73
serverIP: 208.176.126.9 | Explain this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=104.205.99.74 dst=150.142.5.238 protocol=udp sport=54137 dport=53 decision=blocked | {
"action": "block",
"clientport": 54137,
"message": "<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=104.205.99.74 dst=150.142.5.238 protocol=udp sport=54137 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "104.205.99.74",
"serverIP": "150.142.5.238"
} | Create a JSON artifact from the message |
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=104.205.99.74 dst=150.142.5.238 protocol=udp sport=54137 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=104.205.99.74 dst=150.142.5.238 protocol=udp sport=54137 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54137
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 104.205.99.74
serverIP: 150.142.5.238 | Explain this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=137.106.87.16 dst=145.127.28.75 protocol=udp sport=54137 dport=53 decision=blocked | {
"action": "block",
"clientport": 54137,
"message": "<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=137.106.87.16 dst=145.127.28.75 protocol=udp sport=54137 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "137.106.87.16",
"serverIP": "145.127.28.75"
} | Create a JSON artifact from the message |
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=137.106.87.16 dst=145.127.28.75 protocol=udp sport=54137 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=137.106.87.16 dst=145.127.28.75 protocol=udp sport=54137 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54137
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 137.106.87.16
serverIP: 145.127.28.75 | Explain this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=152.136.235.128 dst=33.107.104.107 protocol=udp sport=54650 dport=53 decision=blocked | {
"action": "block",
"clientport": 54650,
"message": "<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=152.136.235.128 dst=33.107.104.107 protocol=udp sport=54650 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "152.136.235.128",
"serverIP": "33.107.104.107"
} | Create a JSON artifact from the message |
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=152.136.235.128 dst=33.107.104.107 protocol=udp sport=54650 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=152.136.235.128 dst=33.107.104.107 protocol=udp sport=54650 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54650
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 152.136.235.128
serverIP: 33.107.104.107 | Explain this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=237.239.153.61 dst=20.131.109.40 protocol=udp sport=54650 dport=53 decision=blocked | {
"action": "block",
"clientport": 54650,
"message": "<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=237.239.153.61 dst=20.131.109.40 protocol=udp sport=54650 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "237.239.153.61",
"serverIP": "20.131.109.40"
} | Create a JSON artifact from the message |
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=237.239.153.61 dst=20.131.109.40 protocol=udp sport=54650 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.539125760 M162_MX67C_SavCCG l7_firewall src=237.239.153.61 dst=20.131.109.40 protocol=udp sport=54650 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54650
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 237.239.153.61
serverIP: 20.131.109.40 | Explain this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=249.79.240.41 dst=168.70.173.242 protocol=udp sport=54137 dport=53 decision=blocked | {
"action": "block",
"clientport": 54137,
"message": "<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=249.79.240.41 dst=168.70.173.242 protocol=udp sport=54137 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "249.79.240.41",
"serverIP": "168.70.173.242"
} | Create a JSON artifact from the message |
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=249.79.240.41 dst=168.70.173.242 protocol=udp sport=54137 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=249.79.240.41 dst=168.70.173.242 protocol=udp sport=54137 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54137
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 249.79.240.41
serverIP: 168.70.173.242 | Explain this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=248.112.181.12 dst=55.133.166.171 protocol=udp sport=54137 dport=53 decision=blocked | {
"action": "block",
"clientport": 54137,
"message": "<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=248.112.181.12 dst=55.133.166.171 protocol=udp sport=54137 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "248.112.181.12",
"serverIP": "55.133.166.171"
} | Create a JSON artifact from the message |
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=248.112.181.12 dst=55.133.166.171 protocol=udp sport=54137 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.521257840 M162_MX67C_SavCCG l7_firewall src=248.112.181.12 dst=55.133.166.171 protocol=udp sport=54137 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54137
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 248.112.181.12
serverIP: 55.133.166.171 | Explain this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=239.164.161.19 dst=254.230.174.18 protocol=udp sport=54137 dport=53 decision=blocked | {
"action": "block",
"clientport": 54137,
"message": "<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=239.164.161.19 dst=254.230.174.18 protocol=udp sport=54137 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "239.164.161.19",
"serverIP": "254.230.174.18"
} | Create a JSON artifact from the message |
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=239.164.161.19 dst=254.230.174.18 protocol=udp sport=54137 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=239.164.161.19 dst=254.230.174.18 protocol=udp sport=54137 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54137
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 239.164.161.19
serverIP: 254.230.174.18 | Explain this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=244.27.120.102 dst=17.13.119.152 protocol=udp sport=54137 dport=53 decision=blocked | {
"action": "block",
"clientport": 54137,
"message": "<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=244.27.120.102 dst=17.13.119.152 protocol=udp sport=54137 dport=53 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 53,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "244.27.120.102",
"serverIP": "17.13.119.152"
} | Create a JSON artifact from the message |
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=244.27.120.102 dst=17.13.119.152 protocol=udp sport=54137 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.75.11.141 1 1690821798.516282880 M162_MX67C_SavCCG l7_firewall src=244.27.120.102 dst=17.13.119.152 protocol=udp sport=54137 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54137
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 53
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 244.27.120.102
serverIP: 17.13.119.152 | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"235.185.135.108","externalIp":"195.110.210.172","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=235.185.135.108 ::: serverIP=195.110.210.172 ::: userName=charlie ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-07T14:49:40.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"235.185.135.108\",\"externalIp\":\"195.110.210.172\",\"categories\":[\"Malware\",\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-07T14:49:40.000Z\"} ::: clientIP=235.185.135.108 ::: serverIP=195.110.210.172 ::: userName=charlie ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "MalwarePhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "235.185.135.108",
"serverIP": "195.110.210.172",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"235.185.135.108","externalIp":"195.110.210.172","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=235.185.135.108 ::: serverIP=195.110.210.172 ::: userName=charlie ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"235.185.135.108","externalIp":"195.110.210.172","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=235.185.135.108 ::: serverIP=195.110.210.172 ::: userName=charlie ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-07T14:49:40.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: MalwarePhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 235.185.135.108
serverIP: 195.110.210.172
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"236.125.137.27","externalIp":"9.103.136.1","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=236.125.137.27 ::: serverIP=9.103.136.1 ::: userName=nighthawk ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-07T14:49:40.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"236.125.137.27\",\"externalIp\":\"9.103.136.1\",\"categories\":[\"Malware\",\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-07T14:49:40.000Z\"} ::: clientIP=236.125.137.27 ::: serverIP=9.103.136.1 ::: userName=nighthawk ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "MalwarePhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "236.125.137.27",
"serverIP": "9.103.136.1",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"236.125.137.27","externalIp":"9.103.136.1","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=236.125.137.27 ::: serverIP=9.103.136.1 ::: userName=nighthawk ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"236.125.137.27","externalIp":"9.103.136.1","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=236.125.137.27 ::: serverIP=9.103.136.1 ::: userName=nighthawk ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-07T14:49:40.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: MalwarePhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 236.125.137.27
serverIP: 9.103.136.1
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"158.51.128.82","externalIp":"245.189.245.97","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=158.51.128.82 ::: serverIP=245.189.245.97 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-07T14:49:40.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"158.51.128.82\",\"externalIp\":\"245.189.245.97\",\"categories\":[\"Malware\",\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-07T14:49:40.000Z\"} ::: clientIP=158.51.128.82 ::: serverIP=245.189.245.97 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "MalwarePhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "158.51.128.82",
"serverIP": "245.189.245.97",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"158.51.128.82","externalIp":"245.189.245.97","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=158.51.128.82 ::: serverIP=245.189.245.97 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"158.51.128.82","externalIp":"245.189.245.97","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=158.51.128.82 ::: serverIP=245.189.245.97 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-07T14:49:40.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: MalwarePhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 158.51.128.82
serverIP: 245.189.245.97
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"71.110.28.188","externalIp":"185.231.85.155","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=71.110.28.188 ::: serverIP=185.231.85.155 ::: userName=alice ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-07T14:49:40.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"71.110.28.188\",\"externalIp\":\"185.231.85.155\",\"categories\":[\"Malware\",\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-07T14:49:40.000Z\"} ::: clientIP=71.110.28.188 ::: serverIP=185.231.85.155 ::: userName=alice ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "MalwarePhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "71.110.28.188",
"serverIP": "185.231.85.155",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"71.110.28.188","externalIp":"185.231.85.155","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=71.110.28.188 ::: serverIP=185.231.85.155 ::: userName=alice ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"71.110.28.188","externalIp":"185.231.85.155","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=71.110.28.188 ::: serverIP=185.231.85.155 ::: userName=alice ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-07T14:49:40.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: MalwarePhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 71.110.28.188
serverIP: 185.231.85.155
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"216.175.130.32","externalIp":"32.251.21.39","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=216.175.130.32 ::: serverIP=32.251.21.39 ::: userName=johndoe ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-07T14:49:40.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"216.175.130.32\",\"externalIp\":\"32.251.21.39\",\"categories\":[\"Malware\",\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-07T14:49:40.000Z\"} ::: clientIP=216.175.130.32 ::: serverIP=32.251.21.39 ::: userName=johndoe ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "MalwarePhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "216.175.130.32",
"serverIP": "32.251.21.39",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"216.175.130.32","externalIp":"32.251.21.39","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=216.175.130.32 ::: serverIP=32.251.21.39 ::: userName=johndoe ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"216.175.130.32","externalIp":"32.251.21.39","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=216.175.130.32 ::: serverIP=32.251.21.39 ::: userName=johndoe ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-07T14:49:40.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: MalwarePhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 216.175.130.32
serverIP: 32.251.21.39
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"219.28.36.190","externalIp":"215.69.76.132","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=219.28.36.190 ::: serverIP=215.69.76.132 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-07T14:49:40.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":535235038,\"originType\":\"Network Devices\",\"internalIp\":\"219.28.36.190\",\"externalIp\":\"215.69.76.132\",\"categories\":[\"Malware\",\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-07T14:49:40.000Z\"} ::: clientIP=219.28.36.190 ::: serverIP=215.69.76.132 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "MalwarePhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "219.28.36.190",
"serverIP": "215.69.76.132",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"219.28.36.190","externalIp":"215.69.76.132","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=219.28.36.190 ::: serverIP=215.69.76.132 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":535235038,"originType":"Network Devices","internalIp":"219.28.36.190","externalIp":"215.69.76.132","categories":["Malware","Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-02-07T14:49:40.000Z"} ::: clientIP=219.28.36.190 ::: serverIP=215.69.76.132 ::: userName=bob ::: created_at=2023-02-07T14:49:40.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-07T14:49:40.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-07T14:49:40.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: MalwarePhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 219.28.36.190
serverIP: 215.69.76.132
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"180.78.123.198","externalIp":"158.227.164.63","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=180.78.123.198 ::: serverIP=158.227.164.63 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-02T15:11:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"180.78.123.198\",\"externalIp\":\"158.227.164.63\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T15:11:30.000Z\"} ::: clientIP=180.78.123.198 ::: serverIP=158.227.164.63 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "180.78.123.198",
"serverIP": "158.227.164.63",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"180.78.123.198","externalIp":"158.227.164.63","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=180.78.123.198 ::: serverIP=158.227.164.63 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"180.78.123.198","externalIp":"158.227.164.63","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=180.78.123.198 ::: serverIP=158.227.164.63 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-02T15:11:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 180.78.123.198
serverIP: 158.227.164.63
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"183.70.184.32","externalIp":"75.13.80.139","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=183.70.184.32 ::: serverIP=75.13.80.139 ::: userName=janedoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-02T15:11:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"183.70.184.32\",\"externalIp\":\"75.13.80.139\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T15:11:30.000Z\"} ::: clientIP=183.70.184.32 ::: serverIP=75.13.80.139 ::: userName=janedoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "183.70.184.32",
"serverIP": "75.13.80.139",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"183.70.184.32","externalIp":"75.13.80.139","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=183.70.184.32 ::: serverIP=75.13.80.139 ::: userName=janedoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"183.70.184.32","externalIp":"75.13.80.139","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=183.70.184.32 ::: serverIP=75.13.80.139 ::: userName=janedoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-02T15:11:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 183.70.184.32
serverIP: 75.13.80.139
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"119.80.14.132","externalIp":"73.202.26.156","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=119.80.14.132 ::: serverIP=73.202.26.156 ::: userName=johndoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-03T13:20:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"119.80.14.132\",\"externalIp\":\"73.202.26.156\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-03T13:20:56.000Z\"} ::: clientIP=119.80.14.132 ::: serverIP=73.202.26.156 ::: userName=johndoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "119.80.14.132",
"serverIP": "73.202.26.156",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"119.80.14.132","externalIp":"73.202.26.156","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=119.80.14.132 ::: serverIP=73.202.26.156 ::: userName=johndoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"119.80.14.132","externalIp":"73.202.26.156","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=119.80.14.132 ::: serverIP=73.202.26.156 ::: userName=johndoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-03T13:20:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 119.80.14.132
serverIP: 73.202.26.156
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"140.22.82.138","externalIp":"170.195.130.19","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=140.22.82.138 ::: serverIP=170.195.130.19 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-03T13:20:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"140.22.82.138\",\"externalIp\":\"170.195.130.19\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-03T13:20:56.000Z\"} ::: clientIP=140.22.82.138 ::: serverIP=170.195.130.19 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "140.22.82.138",
"serverIP": "170.195.130.19",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"140.22.82.138","externalIp":"170.195.130.19","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=140.22.82.138 ::: serverIP=170.195.130.19 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"140.22.82.138","externalIp":"170.195.130.19","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=140.22.82.138 ::: serverIP=170.195.130.19 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-03T13:20:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 140.22.82.138
serverIP: 170.195.130.19
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"244.249.97.15","externalIp":"137.154.221.11","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=244.249.97.15 ::: serverIP=137.154.221.11 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-02T15:11:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"244.249.97.15\",\"externalIp\":\"137.154.221.11\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T15:11:30.000Z\"} ::: clientIP=244.249.97.15 ::: serverIP=137.154.221.11 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "244.249.97.15",
"serverIP": "137.154.221.11",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"244.249.97.15","externalIp":"137.154.221.11","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=244.249.97.15 ::: serverIP=137.154.221.11 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"244.249.97.15","externalIp":"137.154.221.11","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=244.249.97.15 ::: serverIP=137.154.221.11 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-02T15:11:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 244.249.97.15
serverIP: 137.154.221.11
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"28.80.253.139","externalIp":"66.69.215.48","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=28.80.253.139 ::: serverIP=66.69.215.48 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-02T15:11:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"28.80.253.139\",\"externalIp\":\"66.69.215.48\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T15:11:30.000Z\"} ::: clientIP=28.80.253.139 ::: serverIP=66.69.215.48 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "28.80.253.139",
"serverIP": "66.69.215.48",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"28.80.253.139","externalIp":"66.69.215.48","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=28.80.253.139 ::: serverIP=66.69.215.48 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"28.80.253.139","externalIp":"66.69.215.48","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=28.80.253.139 ::: serverIP=66.69.215.48 ::: userName=johndoe ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-02T15:11:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 28.80.253.139
serverIP: 66.69.215.48
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"172.76.118.108","externalIp":"229.116.84.24","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=172.76.118.108 ::: serverIP=229.116.84.24 ::: userName=nighthawk ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-03T13:20:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"172.76.118.108\",\"externalIp\":\"229.116.84.24\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-03T13:20:56.000Z\"} ::: clientIP=172.76.118.108 ::: serverIP=229.116.84.24 ::: userName=nighthawk ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "172.76.118.108",
"serverIP": "229.116.84.24",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"172.76.118.108","externalIp":"229.116.84.24","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=172.76.118.108 ::: serverIP=229.116.84.24 ::: userName=nighthawk ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"172.76.118.108","externalIp":"229.116.84.24","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=172.76.118.108 ::: serverIP=229.116.84.24 ::: userName=nighthawk ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-03T13:20:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 172.76.118.108
serverIP: 229.116.84.24
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.1.181.167","externalIp":"160.129.248.1","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=44.1.181.167 ::: serverIP=160.129.248.1 ::: userName=janedoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-03T13:20:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"44.1.181.167\",\"externalIp\":\"160.129.248.1\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-03T13:20:56.000Z\"} ::: clientIP=44.1.181.167 ::: serverIP=160.129.248.1 ::: userName=janedoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "44.1.181.167",
"serverIP": "160.129.248.1",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.1.181.167","externalIp":"160.129.248.1","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=44.1.181.167 ::: serverIP=160.129.248.1 ::: userName=janedoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.1.181.167","externalIp":"160.129.248.1","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=44.1.181.167 ::: serverIP=160.129.248.1 ::: userName=janedoe ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-03T13:20:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 44.1.181.167
serverIP: 160.129.248.1
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"134.20.20.112","externalIp":"185.194.151.178","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=134.20.20.112 ::: serverIP=185.194.151.178 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-02T15:11:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"134.20.20.112\",\"externalIp\":\"185.194.151.178\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T15:11:30.000Z\"} ::: clientIP=134.20.20.112 ::: serverIP=185.194.151.178 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "134.20.20.112",
"serverIP": "185.194.151.178",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"134.20.20.112","externalIp":"185.194.151.178","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=134.20.20.112 ::: serverIP=185.194.151.178 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"134.20.20.112","externalIp":"185.194.151.178","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=134.20.20.112 ::: serverIP=185.194.151.178 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-02T15:11:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 134.20.20.112
serverIP: 185.194.151.178
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"120.149.218.37","externalIp":"132.62.160.44","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=120.149.218.37 ::: serverIP=132.62.160.44 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-02T15:11:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"120.149.218.37\",\"externalIp\":\"132.62.160.44\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-02T15:11:30.000Z\"} ::: clientIP=120.149.218.37 ::: serverIP=132.62.160.44 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "120.149.218.37",
"serverIP": "132.62.160.44",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"120.149.218.37","externalIp":"132.62.160.44","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=120.149.218.37 ::: serverIP=132.62.160.44 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"120.149.218.37","externalIp":"132.62.160.44","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-02T15:11:30.000Z"} ::: clientIP=120.149.218.37 ::: serverIP=132.62.160.44 ::: userName=fish ::: created_at=2023-02-02T15:11:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-02T15:11:30.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-02T15:11:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 120.149.218.37
serverIP: 132.62.160.44
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"215.123.37.132","externalIp":"33.201.104.14","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=215.123.37.132 ::: serverIP=33.201.104.14 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-03T13:20:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"215.123.37.132\",\"externalIp\":\"33.201.104.14\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-03T13:20:56.000Z\"} ::: clientIP=215.123.37.132 ::: serverIP=33.201.104.14 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "215.123.37.132",
"serverIP": "33.201.104.14",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"215.123.37.132","externalIp":"33.201.104.14","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=215.123.37.132 ::: serverIP=33.201.104.14 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"215.123.37.132","externalIp":"33.201.104.14","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=215.123.37.132 ::: serverIP=33.201.104.14 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-03T13:20:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 215.123.37.132
serverIP: 33.201.104.14
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"47.60.47.159","externalIp":"91.48.63.174","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=47.60.47.159 ::: serverIP=91.48.63.174 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-02-03T13:20:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"47.60.47.159\",\"externalIp\":\"91.48.63.174\",\"categories\":[\"Phishing\",\"Block List\",\"Real Estate\"],\"tags\":[],\"destination\":\"ramsinvesting.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-02-03T13:20:56.000Z\"} ::: clientIP=47.60.47.159 ::: serverIP=91.48.63.174 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ramsinvesting.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ramsinvesting.com",
"vendorcode": "PhishingBlock ListReal Estate",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "47.60.47.159",
"serverIP": "91.48.63.174",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"47.60.47.159","externalIp":"91.48.63.174","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=47.60.47.159 ::: serverIP=91.48.63.174 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ramsinvesting.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"47.60.47.159","externalIp":"91.48.63.174","categories":["Phishing","Block List","Real Estate"],"tags":[],"destination":"ramsinvesting.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-02-03T13:20:56.000Z"} ::: clientIP=47.60.47.159 ::: serverIP=91.48.63.174 ::: userName=fish ::: created_at=2023-02-03T13:20:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=PhishingBlock ListReal Estate ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-02-03T13:20:56.000Z ::: serverHostname=ramsinvesting.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-02-03T13:20:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ramsinvesting.com
messagetype: firewall_action
severitycode: 2
fqdn: ramsinvesting.com
vendorcode: PhishingBlock ListReal Estate
action: block
streamName: OpenDNS Detection
clientIP: 47.60.47.159
serverIP: 91.48.63.174
userName: fish | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=62.74.82.22 dst=148.165.179.111 protocol=tcp sport=57882 dport=443 decision=blocked | {
"action": "block",
"clientport": 57882,
"message": "<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=62.74.82.22 dst=148.165.179.111 protocol=tcp sport=57882 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "62.74.82.22",
"serverIP": "148.165.179.111"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=62.74.82.22 dst=148.165.179.111 protocol=tcp sport=57882 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=62.74.82.22 dst=148.165.179.111 protocol=tcp sport=57882 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57882
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 62.74.82.22
serverIP: 148.165.179.111 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=161.247.205.112 dst=253.74.163.136 protocol=tcp sport=57882 dport=443 decision=blocked | {
"action": "block",
"clientport": 57882,
"message": "<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=161.247.205.112 dst=253.74.163.136 protocol=tcp sport=57882 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "161.247.205.112",
"serverIP": "253.74.163.136"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=161.247.205.112 dst=253.74.163.136 protocol=tcp sport=57882 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=161.247.205.112 dst=253.74.163.136 protocol=tcp sport=57882 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57882
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 161.247.205.112
serverIP: 253.74.163.136 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=27.29.28.67 dst=128.184.94.189 protocol=tcp sport=57882 dport=443 decision=blocked | {
"action": "block",
"clientport": 57882,
"message": "<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=27.29.28.67 dst=128.184.94.189 protocol=tcp sport=57882 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "27.29.28.67",
"serverIP": "128.184.94.189"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=27.29.28.67 dst=128.184.94.189 protocol=tcp sport=57882 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=27.29.28.67 dst=128.184.94.189 protocol=tcp sport=57882 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57882
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 27.29.28.67
serverIP: 128.184.94.189 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=122.70.19.129 dst=27.220.86.221 protocol=tcp sport=57882 dport=443 decision=blocked | {
"action": "block",
"clientport": 57882,
"message": "<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=122.70.19.129 dst=27.220.86.221 protocol=tcp sport=57882 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "122.70.19.129",
"serverIP": "27.220.86.221"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689854952.053599157 NORDC_MX400_1 l7_firewall src=122.70.19.129 dst=27.220.86.221 protocol=tcp sport=57882 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.