input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.805Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t245.11.144.192\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"245.11.144.192","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808639,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.805Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t245.11.144.192\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"245.11.144.192","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808639,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52686
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 86808639
streamName: microsoft-windows-security-auditing
clientIP: 245.11.144.192
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.805Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t221.66.148.171\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"221.66.148.171","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808639,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52686,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T16:12:24.805Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T16:12:25.551Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tLT51387\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT51387\\n\\tSource Network Address:\\t221.66.148.171\\n\\tSource Port:\\t\\t52686\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC3.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"221.66.148.171\",\"IpPort\":\"52686\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT51387\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT51387\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":86808639,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "86808639",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "221.66.148.171",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.805Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t221.66.148.171\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"221.66.148.171","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808639,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.805Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t221.66.148.171\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"221.66.148.171","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808639,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52686
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 86808639
streamName: microsoft-windows-security-auditing
clientIP: 221.66.148.171
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"205.70.105.101","externalIp":"175.134.255.87","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=205.70.105.101 ::: serverIP=175.134.255.87 ::: userName=bob ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":606655908,\"originType\":\"Network Devices\",\"internalIp\":\"205.70.105.101\",\"externalIp\":\"175.134.255.87\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T15:25:24.000Z\"} ::: clientIP=205.70.105.101 ::: serverIP=175.134.255.87 ::: userName=bob ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T15:25:24.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "205.70.105.101",
"serverIP": "175.134.255.87",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"205.70.105.101","externalIp":"175.134.255.87","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=205.70.105.101 ::: serverIP=175.134.255.87 ::: userName=bob ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"205.70.105.101","externalIp":"175.134.255.87","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=205.70.105.101 ::: serverIP=175.134.255.87 ::: userName=bob ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T15:25:24.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 205.70.105.101
serverIP: 175.134.255.87
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"53.166.99.30","externalIp":"86.93.119.87","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=53.166.99.30 ::: serverIP=86.93.119.87 ::: userName=fish ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":606655908,\"originType\":\"Network Devices\",\"internalIp\":\"53.166.99.30\",\"externalIp\":\"86.93.119.87\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T15:25:24.000Z\"} ::: clientIP=53.166.99.30 ::: serverIP=86.93.119.87 ::: userName=fish ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T15:25:24.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "53.166.99.30",
"serverIP": "86.93.119.87",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"53.166.99.30","externalIp":"86.93.119.87","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=53.166.99.30 ::: serverIP=86.93.119.87 ::: userName=fish ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"53.166.99.30","externalIp":"86.93.119.87","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=53.166.99.30 ::: serverIP=86.93.119.87 ::: userName=fish ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T15:25:24.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 53.166.99.30
serverIP: 86.93.119.87
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"145.84.64.122","externalIp":"225.244.228.151","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=145.84.64.122 ::: serverIP=225.244.228.151 ::: userName=johndoe ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":606655908,\"originType\":\"Network Devices\",\"internalIp\":\"145.84.64.122\",\"externalIp\":\"225.244.228.151\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T15:25:24.000Z\"} ::: clientIP=145.84.64.122 ::: serverIP=225.244.228.151 ::: userName=johndoe ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T15:25:24.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "145.84.64.122",
"serverIP": "225.244.228.151",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"145.84.64.122","externalIp":"225.244.228.151","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=145.84.64.122 ::: serverIP=225.244.228.151 ::: userName=johndoe ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"145.84.64.122","externalIp":"225.244.228.151","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=145.84.64.122 ::: serverIP=225.244.228.151 ::: userName=johndoe ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T15:25:24.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 145.84.64.122
serverIP: 225.244.228.151
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"99.16.141.3","externalIp":"233.188.64.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=99.16.141.3 ::: serverIP=233.188.64.92 ::: userName=janedoe ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":606655908,\"originType\":\"Network Devices\",\"internalIp\":\"99.16.141.3\",\"externalIp\":\"233.188.64.92\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T15:25:24.000Z\"} ::: clientIP=99.16.141.3 ::: serverIP=233.188.64.92 ::: userName=janedoe ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T15:25:24.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "99.16.141.3",
"serverIP": "233.188.64.92",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"99.16.141.3","externalIp":"233.188.64.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=99.16.141.3 ::: serverIP=233.188.64.92 ::: userName=janedoe ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"99.16.141.3","externalIp":"233.188.64.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=99.16.141.3 ::: serverIP=233.188.64.92 ::: userName=janedoe ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T15:25:24.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 99.16.141.3
serverIP: 233.188.64.92
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"27.151.161.24","externalIp":"26.240.74.104","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=27.151.161.24 ::: serverIP=26.240.74.104 ::: userName=johndoe ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":606655908,\"originType\":\"Network Devices\",\"internalIp\":\"27.151.161.24\",\"externalIp\":\"26.240.74.104\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T15:25:24.000Z\"} ::: clientIP=27.151.161.24 ::: serverIP=26.240.74.104 ::: userName=johndoe ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T15:25:24.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "27.151.161.24",
"serverIP": "26.240.74.104",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"27.151.161.24","externalIp":"26.240.74.104","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=27.151.161.24 ::: serverIP=26.240.74.104 ::: userName=johndoe ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"27.151.161.24","externalIp":"26.240.74.104","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=27.151.161.24 ::: serverIP=26.240.74.104 ::: userName=johndoe ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T15:25:24.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 27.151.161.24
serverIP: 26.240.74.104
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"89.5.247.26","externalIp":"202.55.160.176","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=89.5.247.26 ::: serverIP=202.55.160.176 ::: userName=charlie ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "find-prizes.life",
"message": "WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={\"originId\":606655908,\"originType\":\"Network Devices\",\"internalIp\":\"89.5.247.26\",\"externalIp\":\"202.55.160.176\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"find-prizes.life\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-24T15:25:24.000Z\"} ::: clientIP=89.5.247.26 ::: serverIP=202.55.160.176 ::: userName=charlie ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "find-prizes.life",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-24T15:25:24.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "MalwareNot Actionable",
"streamName": "OpenDNS Detection",
"clientIP": "89.5.247.26",
"serverIP": "202.55.160.176",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"89.5.247.26","externalIp":"202.55.160.176","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=89.5.247.26 ::: serverIP=202.55.160.176 ::: userName=charlie ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=find-prizes.life ::: action=BLOCKED ::: message={"originId":606655908,"originType":"Network Devices","internalIp":"89.5.247.26","externalIp":"202.55.160.176","categories":["Malware","Not Actionable"],"tags":[],"destination":"find-prizes.life","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-24T15:25:24.000Z"} ::: clientIP=89.5.247.26 ::: serverIP=202.55.160.176 ::: userName=charlie ::: created_at=2023-05-24T15:25:24.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-24T15:25:24.000Z ::: serverHostname=find-prizes.life ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: find-prizes.life
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: find-prizes.life
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-24T15:25:24.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: MalwareNot Actionable
streamName: OpenDNS Detection
clientIP: 89.5.247.26
serverIP: 202.55.160.176
userName: charlie | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=139.34.197.96 dst=243.247.189.175 protocol=tcp sport=65304 dport=443 decision=blocked | {
"action": "block",
"clientport": 65304,
"message": "<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=139.34.197.96 dst=243.247.189.175 protocol=tcp sport=65304 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "139.34.197.96",
"serverIP": "243.247.189.175"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=139.34.197.96 dst=243.247.189.175 protocol=tcp sport=65304 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=139.34.197.96 dst=243.247.189.175 protocol=tcp sport=65304 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 65304
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 139.34.197.96
serverIP: 243.247.189.175 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=129.116.216.146 dst=14.29.162.88 protocol=tcp sport=65304 dport=443 decision=blocked | {
"action": "block",
"clientport": 65304,
"message": "<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=129.116.216.146 dst=14.29.162.88 protocol=tcp sport=65304 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "129.116.216.146",
"serverIP": "14.29.162.88"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=129.116.216.146 dst=14.29.162.88 protocol=tcp sport=65304 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=129.116.216.146 dst=14.29.162.88 protocol=tcp sport=65304 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 65304
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 129.116.216.146
serverIP: 14.29.162.88 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=101.120.91.5 dst=65.3.252.83 protocol=tcp sport=65304 dport=443 decision=blocked | {
"action": "block",
"clientport": 65304,
"message": "<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=101.120.91.5 dst=65.3.252.83 protocol=tcp sport=65304 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "101.120.91.5",
"serverIP": "65.3.252.83"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=101.120.91.5 dst=65.3.252.83 protocol=tcp sport=65304 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=101.120.91.5 dst=65.3.252.83 protocol=tcp sport=65304 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 65304
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 101.120.91.5
serverIP: 65.3.252.83 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=148.153.168.36 dst=12.139.102.128 protocol=tcp sport=65304 dport=443 decision=blocked | {
"action": "block",
"clientport": 65304,
"message": "<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=148.153.168.36 dst=12.139.102.128 protocol=tcp sport=65304 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "148.153.168.36",
"serverIP": "12.139.102.128"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=148.153.168.36 dst=12.139.102.128 protocol=tcp sport=65304 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689967390.679487715 NORDC_MX400_1 l7_firewall src=148.153.168.36 dst=12.139.102.128 protocol=tcp sport=65304 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 65304
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 148.153.168.36
serverIP: 12.139.102.128 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=188.180.13.122 dst=85.168.251.252 protocol=icmp type=0 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=188.180.13.122 dst=85.168.251.252 protocol=icmp type=0 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"protocol": 1,
"streamName": "meraki_l7_firewall",
"clientIP": "188.180.13.122",
"serverIP": "85.168.251.252"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=188.180.13.122 dst=85.168.251.252 protocol=icmp type=0 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=188.180.13.122 dst=85.168.251.252 protocol=icmp type=0 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
protocol: 1
streamName: meraki_l7_firewall
clientIP: 188.180.13.122
serverIP: 85.168.251.252 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=66.178.57.7 dst=6.6.177.114 protocol=icmp type=0 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=66.178.57.7 dst=6.6.177.114 protocol=icmp type=0 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"protocol": 1,
"streamName": "meraki_l7_firewall",
"clientIP": "66.178.57.7",
"serverIP": "6.6.177.114"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=66.178.57.7 dst=6.6.177.114 protocol=icmp type=0 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=66.178.57.7 dst=6.6.177.114 protocol=icmp type=0 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
protocol: 1
streamName: meraki_l7_firewall
clientIP: 66.178.57.7
serverIP: 6.6.177.114 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=20.20.14.121 dst=6.81.197.45 protocol=icmp type=0 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=20.20.14.121 dst=6.81.197.45 protocol=icmp type=0 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"protocol": 1,
"streamName": "meraki_l7_firewall",
"clientIP": "20.20.14.121",
"serverIP": "6.81.197.45"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=20.20.14.121 dst=6.81.197.45 protocol=icmp type=0 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=20.20.14.121 dst=6.81.197.45 protocol=icmp type=0 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
protocol: 1
streamName: meraki_l7_firewall
clientIP: 20.20.14.121
serverIP: 6.81.197.45 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=44.119.142.33 dst=211.76.43.70 protocol=icmp type=0 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=44.119.142.33 dst=211.76.43.70 protocol=icmp type=0 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"protocol": 1,
"streamName": "meraki_l7_firewall",
"clientIP": "44.119.142.33",
"serverIP": "211.76.43.70"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=44.119.142.33 dst=211.76.43.70 protocol=icmp type=0 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1675830428.789981489 NORDC_MX400_1 l7_firewall src=44.119.142.33 dst=211.76.43.70 protocol=icmp type=0 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
protocol: 1
streamName: meraki_l7_firewall
clientIP: 44.119.142.33
serverIP: 211.76.43.70 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=6.191.176.25 dst=90.2.49.129 protocol=tcp sport=58555 dport=443 decision=blocked | {
"action": "block",
"clientport": 58555,
"message": "<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=6.191.176.25 dst=90.2.49.129 protocol=tcp sport=58555 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "6.191.176.25",
"serverIP": "90.2.49.129"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=6.191.176.25 dst=90.2.49.129 protocol=tcp sport=58555 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=6.191.176.25 dst=90.2.49.129 protocol=tcp sport=58555 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58555
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 6.191.176.25
serverIP: 90.2.49.129 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=183.107.2.209 dst=30.119.22.226 protocol=tcp sport=58555 dport=443 decision=blocked | {
"action": "block",
"clientport": 58555,
"message": "<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=183.107.2.209 dst=30.119.22.226 protocol=tcp sport=58555 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "183.107.2.209",
"serverIP": "30.119.22.226"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=183.107.2.209 dst=30.119.22.226 protocol=tcp sport=58555 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=183.107.2.209 dst=30.119.22.226 protocol=tcp sport=58555 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58555
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 183.107.2.209
serverIP: 30.119.22.226 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=65.85.31.125 dst=196.1.62.214 protocol=tcp sport=58555 dport=443 decision=blocked | {
"action": "block",
"clientport": 58555,
"message": "<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=65.85.31.125 dst=196.1.62.214 protocol=tcp sport=58555 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "65.85.31.125",
"serverIP": "196.1.62.214"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=65.85.31.125 dst=196.1.62.214 protocol=tcp sport=58555 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=65.85.31.125 dst=196.1.62.214 protocol=tcp sport=58555 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58555
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 65.85.31.125
serverIP: 196.1.62.214 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=236.125.133.235 dst=55.240.135.194 protocol=tcp sport=58555 dport=443 decision=blocked | {
"action": "block",
"clientport": 58555,
"message": "<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=236.125.133.235 dst=55.240.135.194 protocol=tcp sport=58555 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "236.125.133.235",
"serverIP": "55.240.135.194"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=236.125.133.235 dst=55.240.135.194 protocol=tcp sport=58555 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690374192.582147069 NORDC_MX400_1 l7_firewall src=236.125.133.235 dst=55.240.135.194 protocol=tcp sport=58555 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58555
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 236.125.133.235
serverIP: 55.240.135.194 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=166.13.252.48 dst=214.77.180.150 protocol=tcp sport=60217 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=166.13.252.48 dst=214.77.180.150 protocol=tcp sport=60217 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60217,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "166.13.252.48",
"serverIP": "214.77.180.150"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=166.13.252.48 dst=214.77.180.150 protocol=tcp sport=60217 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=166.13.252.48 dst=214.77.180.150 protocol=tcp sport=60217 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60217
protocol: 6
streamName: meraki_l7_firewall
clientIP: 166.13.252.48
serverIP: 214.77.180.150 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=79.234.235.102 dst=201.94.41.167 protocol=tcp sport=60217 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=79.234.235.102 dst=201.94.41.167 protocol=tcp sport=60217 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60217,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "79.234.235.102",
"serverIP": "201.94.41.167"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=79.234.235.102 dst=201.94.41.167 protocol=tcp sport=60217 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=79.234.235.102 dst=201.94.41.167 protocol=tcp sport=60217 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60217
protocol: 6
streamName: meraki_l7_firewall
clientIP: 79.234.235.102
serverIP: 201.94.41.167 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=218.88.181.120 dst=29.168.91.252 protocol=tcp sport=60217 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=218.88.181.120 dst=29.168.91.252 protocol=tcp sport=60217 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60217,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "218.88.181.120",
"serverIP": "29.168.91.252"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=218.88.181.120 dst=29.168.91.252 protocol=tcp sport=60217 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=218.88.181.120 dst=29.168.91.252 protocol=tcp sport=60217 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60217
protocol: 6
streamName: meraki_l7_firewall
clientIP: 218.88.181.120
serverIP: 29.168.91.252 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=40.32.245.155 dst=20.89.63.154 protocol=tcp sport=60217 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=40.32.245.155 dst=20.89.63.154 protocol=tcp sport=60217 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60217,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "40.32.245.155",
"serverIP": "20.89.63.154"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=40.32.245.155 dst=20.89.63.154 protocol=tcp sport=60217 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1676087527.004880061 NORDC_MX400_1 l7_firewall src=40.32.245.155 dst=20.89.63.154 protocol=tcp sport=60217 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60217
protocol: 6
streamName: meraki_l7_firewall
clientIP: 40.32.245.155
serverIP: 20.89.63.154 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=169.234.22.4 dst=185.237.113.145 protocol=tcp sport=8000 dport=46958 decision=blocked | {
"action": "block",
"clientport": 46958,
"message": "<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=169.234.22.4 dst=185.237.113.145 protocol=tcp sport=8000 dport=46958 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 8000,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "185.237.113.145",
"serverIP": "169.234.22.4"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=169.234.22.4 dst=185.237.113.145 protocol=tcp sport=8000 dport=46958 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=169.234.22.4 dst=185.237.113.145 protocol=tcp sport=8000 dport=46958 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 46958
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 8000
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 185.237.113.145
serverIP: 169.234.22.4 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=9.80.93.91 dst=196.195.177.152 protocol=tcp sport=8000 dport=46958 decision=blocked | {
"action": "block",
"clientport": 46958,
"message": "<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=9.80.93.91 dst=196.195.177.152 protocol=tcp sport=8000 dport=46958 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 8000,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "196.195.177.152",
"serverIP": "9.80.93.91"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=9.80.93.91 dst=196.195.177.152 protocol=tcp sport=8000 dport=46958 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=9.80.93.91 dst=196.195.177.152 protocol=tcp sport=8000 dport=46958 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 46958
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 8000
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 196.195.177.152
serverIP: 9.80.93.91 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=148.233.4.127 dst=14.251.59.61 protocol=tcp sport=8000 dport=46958 decision=blocked | {
"action": "block",
"clientport": 46958,
"message": "<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=148.233.4.127 dst=14.251.59.61 protocol=tcp sport=8000 dport=46958 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 8000,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "14.251.59.61",
"serverIP": "148.233.4.127"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=148.233.4.127 dst=14.251.59.61 protocol=tcp sport=8000 dport=46958 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=148.233.4.127 dst=14.251.59.61 protocol=tcp sport=8000 dport=46958 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 46958
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 8000
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 14.251.59.61
serverIP: 148.233.4.127 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=73.159.65.145 dst=62.12.161.101 protocol=tcp sport=8000 dport=46958 decision=blocked | {
"action": "block",
"clientport": 46958,
"message": "<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=73.159.65.145 dst=62.12.161.101 protocol=tcp sport=8000 dport=46958 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 8000,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "62.12.161.101",
"serverIP": "73.159.65.145"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=73.159.65.145 dst=62.12.161.101 protocol=tcp sport=8000 dport=46958 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691184872.813360949 NORDC_MX400_1 l7_firewall src=73.159.65.145 dst=62.12.161.101 protocol=tcp sport=8000 dport=46958 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 46958
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 8000
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 62.12.161.101
serverIP: 73.159.65.145 | Explain this syslog message |
<172>Mar 27 2023 16:11:03 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:169.103.33.15/54082 dst outside:193.190.223.111/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 27 2023 16:11:03 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:169.103.33.15/54082 dst outside:193.190.223.111/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 54082,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "169.103.33.15",
"serverIP": "193.190.223.111"
} | Create a JSON artifact from the message |
<172>Mar 27 2023 16:11:03 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:169.103.33.15/54082 dst outside:193.190.223.111/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Mar 27 2023 16:11:03 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:169.103.33.15/54082 dst outside:193.190.223.111/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 54082
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 169.103.33.15
serverIP: 193.190.223.111 | Explain this syslog message |
<172>Mar 27 2023 16:11:03 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:98.135.177.78/54082 dst outside:103.64.196.243/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 27 2023 16:11:03 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:98.135.177.78/54082 dst outside:103.64.196.243/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 54082,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "98.135.177.78",
"serverIP": "103.64.196.243"
} | Create a JSON artifact from the message |
<172>Mar 27 2023 16:11:03 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:98.135.177.78/54082 dst outside:103.64.196.243/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Mar 27 2023 16:11:03 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:98.135.177.78/54082 dst outside:103.64.196.243/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 54082
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 98.135.177.78
serverIP: 103.64.196.243 | Explain this syslog message |
<172>Mar 27 2023 15:16:26 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:57.170.141.77/51076 dst outside:178.49.168.200/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 27 2023 15:16:26 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:57.170.141.77/51076 dst outside:178.49.168.200/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 51076,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "57.170.141.77",
"serverIP": "178.49.168.200"
} | Create a JSON artifact from the message |
<172>Mar 27 2023 15:16:26 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:57.170.141.77/51076 dst outside:178.49.168.200/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Mar 27 2023 15:16:26 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:57.170.141.77/51076 dst outside:178.49.168.200/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 51076
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 57.170.141.77
serverIP: 178.49.168.200 | Explain this syslog message |
<172>Mar 27 2023 15:16:26 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:146.242.200.232/51076 dst outside:249.255.17.41/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 27 2023 15:16:26 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:146.242.200.232/51076 dst outside:249.255.17.41/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 51076,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "146.242.200.232",
"serverIP": "249.255.17.41"
} | Create a JSON artifact from the message |
<172>Mar 27 2023 15:16:26 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:146.242.200.232/51076 dst outside:249.255.17.41/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Mar 27 2023 15:16:26 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:146.242.200.232/51076 dst outside:249.255.17.41/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 51076
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 146.242.200.232
serverIP: 249.255.17.41 | Explain this syslog message |
<172>Mar 27 2023 15:31:13 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:200.243.57.98/51307 dst outside:245.215.52.129/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 27 2023 15:31:13 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:200.243.57.98/51307 dst outside:245.215.52.129/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 51307,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "200.243.57.98",
"serverIP": "245.215.52.129"
} | Create a JSON artifact from the message |
<172>Mar 27 2023 15:31:13 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:200.243.57.98/51307 dst outside:245.215.52.129/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Mar 27 2023 15:31:13 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:200.243.57.98/51307 dst outside:245.215.52.129/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 51307
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 200.243.57.98
serverIP: 245.215.52.129 | Explain this syslog message |
<172>Mar 27 2023 15:31:13 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:109.222.0.2/51307 dst outside:87.192.160.255/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 27 2023 15:31:13 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:109.222.0.2/51307 dst outside:87.192.160.255/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 51307,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "109.222.0.2",
"serverIP": "87.192.160.255"
} | Create a JSON artifact from the message |
<172>Mar 27 2023 15:31:13 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:109.222.0.2/51307 dst outside:87.192.160.255/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.