input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=218.251.86.166 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.191.10.49 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.191.10.49 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:164.52.25.251", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=218.251.86.166 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=239.191.10.49 spt=58224 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.191.10.49 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675137584697 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/favicon.ico", "clientport": 58224, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "239.191.10.49", "serverIP": "218.251.86.166", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=218.251.86.166 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.191.10.49 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.191.10.49 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=218.251.86.166 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.191.10.49 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.191.10.49 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1675137584697 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /favicon.ico clientport: 58224 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 239.191.10.49 serverIP: 218.251.86.166 userName: -
Explain this syslog message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=243.240.236.99 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.133.32.16 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.133.32.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:164.52.25.251", "AttackGroup:Forceful Browsing" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=243.240.236.99 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=79.133.32.16 spt=58224 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.133.32.16 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675137584697 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/favicon.ico", "clientport": 58224, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "79.133.32.16", "serverIP": "243.240.236.99", "userName": "-" }
Create a JSON artifact from the message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=243.240.236.99 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.133.32.16 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.133.32.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=243.240.236.99 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.133.32.16 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.133.32.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing'] productids: [0] sourceinfo: unknown localstarttime: 1675137584697 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /favicon.ico clientport: 58224 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 79.133.32.16 serverIP: 243.240.236.99 userName: -
Explain this syslog message
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.84.233.17 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=115.105.241.174 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=115.105.241.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 57202, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1708546833611 ", "message": "<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.84.233.17 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=115.105.241.174 spt=57202 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46\" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=115.105.241.174 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "GEO_IP_BLOCK", "ProxyIP:185.224.128.55" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "115.105.241.174", "serverIP": "114.84.233.17", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.84.233.17 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=115.105.241.174 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=115.105.241.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.84.233.17 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=115.105.241.174 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=115.105.241.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 57202 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1708546833611 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'GEO_IP_BLOCK', 'ProxyIP:185.224.128.55'] vendorcode: 342 streamName: barracuda_waf clientIP: 115.105.241.174 serverIP: 114.84.233.17 userName: -
Explain this syslog message
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=149.173.242.254 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=225.2.34.102 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.2.34.102 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 57202, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1708546833611 ", "message": "<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=149.173.242.254 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=225.2.34.102 spt=57202 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46\" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.2.34.102 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "GEO_IP_BLOCK", "ProxyIP:185.224.128.55" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "225.2.34.102", "serverIP": "149.173.242.254", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=149.173.242.254 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=225.2.34.102 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.2.34.102 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=149.173.242.254 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=225.2.34.102 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.2.34.102 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 57202 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1708546833611 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'GEO_IP_BLOCK', 'ProxyIP:185.224.128.55'] vendorcode: 342 streamName: barracuda_waf clientIP: 225.2.34.102 serverIP: 149.173.242.254 userName: -
Explain this syslog message
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.3.209.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.52.96.146 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.52.96.146 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 57202, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1708546833611 ", "message": "<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.3.209.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=180.52.96.146 spt=57202 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46\" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.52.96.146 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "GEO_IP_BLOCK", "ProxyIP:185.224.128.55" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "180.52.96.146", "serverIP": "77.3.209.34", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.3.209.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.52.96.146 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.52.96.146 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.3.209.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.52.96.146 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.52.96.146 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 57202 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1708546833611 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'GEO_IP_BLOCK', 'ProxyIP:185.224.128.55'] vendorcode: 342 streamName: barracuda_waf clientIP: 180.52.96.146 serverIP: 77.3.209.34 userName: -
Explain this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"223.57.146.57","externalIp":"223.57.146.57","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=223.57.146.57 ::: serverIP=223.57.146.57 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tor-exit-13.zbau.f3netze.de", "message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"223.57.146.57\",\"externalIp\":\"223.57.146.57\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=223.57.146.57 ::: serverIP=223.57.146.57 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tor-exit-13.zbau.f3netze.de", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-05T21:45:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Command and ControlPersonal Sites", "streamName": "OpenDNS Detection", "clientIP": "223.57.146.57", "serverIP": "215.124.225.21", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"223.57.146.57","externalIp":"223.57.146.57","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=223.57.146.57 ::: serverIP=223.57.146.57 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"223.57.146.57","externalIp":"223.57.146.57","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=223.57.146.57 ::: serverIP=223.57.146.57 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tor-exit-13.zbau.f3netze.de messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tor-exit-13.zbau.f3netze.de severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-05T21:45:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Command and ControlPersonal Sites streamName: OpenDNS Detection clientIP: 223.57.146.57 serverIP: 215.124.225.21 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"78.218.238.78","externalIp":"78.218.238.78","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=78.218.238.78 ::: serverIP=78.218.238.78 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tor-exit-13.zbau.f3netze.de", "message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"78.218.238.78\",\"externalIp\":\"78.218.238.78\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=78.218.238.78 ::: serverIP=78.218.238.78 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tor-exit-13.zbau.f3netze.de", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-05T21:45:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Command and ControlPersonal Sites", "streamName": "OpenDNS Detection", "clientIP": "78.218.238.78", "serverIP": "147.129.72.94", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"78.218.238.78","externalIp":"78.218.238.78","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=78.218.238.78 ::: serverIP=78.218.238.78 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"78.218.238.78","externalIp":"78.218.238.78","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=78.218.238.78 ::: serverIP=78.218.238.78 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tor-exit-13.zbau.f3netze.de messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tor-exit-13.zbau.f3netze.de severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-05T21:45:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Command and ControlPersonal Sites streamName: OpenDNS Detection clientIP: 78.218.238.78 serverIP: 147.129.72.94 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"177.177.58.251","externalIp":"177.177.58.251","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=177.177.58.251 ::: serverIP=177.177.58.251 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tor-exit-13.zbau.f3netze.de", "message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"177.177.58.251\",\"externalIp\":\"177.177.58.251\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=177.177.58.251 ::: serverIP=177.177.58.251 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tor-exit-13.zbau.f3netze.de", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-05T21:45:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Command and ControlPersonal Sites", "streamName": "OpenDNS Detection", "clientIP": "177.177.58.251", "serverIP": "117.146.224.13", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"177.177.58.251","externalIp":"177.177.58.251","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=177.177.58.251 ::: serverIP=177.177.58.251 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"177.177.58.251","externalIp":"177.177.58.251","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=177.177.58.251 ::: serverIP=177.177.58.251 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tor-exit-13.zbau.f3netze.de messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tor-exit-13.zbau.f3netze.de severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-05T21:45:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Command and ControlPersonal Sites streamName: OpenDNS Detection clientIP: 177.177.58.251 serverIP: 117.146.224.13 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"9.255.68.141","externalIp":"9.255.68.141","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=9.255.68.141 ::: serverIP=9.255.68.141 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tor-exit-13.zbau.f3netze.de", "message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"9.255.68.141\",\"externalIp\":\"9.255.68.141\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=9.255.68.141 ::: serverIP=9.255.68.141 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tor-exit-13.zbau.f3netze.de", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-05T21:45:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Command and ControlPersonal Sites", "streamName": "OpenDNS Detection", "clientIP": "9.255.68.141", "serverIP": "110.221.33.149", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"9.255.68.141","externalIp":"9.255.68.141","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=9.255.68.141 ::: serverIP=9.255.68.141 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"9.255.68.141","externalIp":"9.255.68.141","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=9.255.68.141 ::: serverIP=9.255.68.141 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tor-exit-13.zbau.f3netze.de messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tor-exit-13.zbau.f3netze.de severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-05T21:45:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Command and ControlPersonal Sites streamName: OpenDNS Detection clientIP: 9.255.68.141 serverIP: 110.221.33.149 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"170.84.153.156","externalIp":"170.84.153.156","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=170.84.153.156 ::: serverIP=170.84.153.156 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tor-exit-13.zbau.f3netze.de", "message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"170.84.153.156\",\"externalIp\":\"170.84.153.156\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=170.84.153.156 ::: serverIP=170.84.153.156 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tor-exit-13.zbau.f3netze.de", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-05T21:45:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Command and ControlPersonal Sites", "streamName": "OpenDNS Detection", "clientIP": "170.84.153.156", "serverIP": "39.18.44.156", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"170.84.153.156","externalIp":"170.84.153.156","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=170.84.153.156 ::: serverIP=170.84.153.156 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"170.84.153.156","externalIp":"170.84.153.156","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=170.84.153.156 ::: serverIP=170.84.153.156 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tor-exit-13.zbau.f3netze.de messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tor-exit-13.zbau.f3netze.de severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-05T21:45:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Command and ControlPersonal Sites streamName: OpenDNS Detection clientIP: 170.84.153.156 serverIP: 39.18.44.156 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"163.71.181.206","externalIp":"163.71.181.206","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=163.71.181.206 ::: serverIP=163.71.181.206 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tor-exit-13.zbau.f3netze.de", "message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"163.71.181.206\",\"externalIp\":\"163.71.181.206\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=163.71.181.206 ::: serverIP=163.71.181.206 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tor-exit-13.zbau.f3netze.de", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-05T21:45:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Command and ControlPersonal Sites", "streamName": "OpenDNS Detection", "clientIP": "163.71.181.206", "serverIP": "162.97.98.158", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"163.71.181.206","externalIp":"163.71.181.206","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=163.71.181.206 ::: serverIP=163.71.181.206 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"163.71.181.206","externalIp":"163.71.181.206","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=163.71.181.206 ::: serverIP=163.71.181.206 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tor-exit-13.zbau.f3netze.de messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tor-exit-13.zbau.f3netze.de severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-05T21:45:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Command and ControlPersonal Sites streamName: OpenDNS Detection clientIP: 163.71.181.206 serverIP: 162.97.98.158 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"127.128.253.77","externalIp":"127.128.253.77","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=127.128.253.77 ::: serverIP=127.128.253.77 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tor-exit-13.zbau.f3netze.de", "message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"127.128.253.77\",\"externalIp\":\"127.128.253.77\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=127.128.253.77 ::: serverIP=127.128.253.77 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tor-exit-13.zbau.f3netze.de", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-05T21:45:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Command and ControlPersonal Sites", "streamName": "OpenDNS Detection", "clientIP": "127.128.253.77", "serverIP": "203.182.0.220", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"127.128.253.77","externalIp":"127.128.253.77","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=127.128.253.77 ::: serverIP=127.128.253.77 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"127.128.253.77","externalIp":"127.128.253.77","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=127.128.253.77 ::: serverIP=127.128.253.77 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tor-exit-13.zbau.f3netze.de messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tor-exit-13.zbau.f3netze.de severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-05T21:45:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Command and ControlPersonal Sites streamName: OpenDNS Detection clientIP: 127.128.253.77 serverIP: 203.182.0.220 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.38.205.52","externalIp":"255.38.205.52","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=255.38.205.52 ::: serverIP=255.38.205.52 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "tor-exit-13.zbau.f3netze.de", "message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"255.38.205.52\",\"externalIp\":\"255.38.205.52\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=255.38.205.52 ::: serverIP=255.38.205.52 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "tor-exit-13.zbau.f3netze.de", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-05T21:45:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Command and ControlPersonal Sites", "streamName": "OpenDNS Detection", "clientIP": "255.38.205.52", "serverIP": "16.45.68.149", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.38.205.52","externalIp":"255.38.205.52","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=255.38.205.52 ::: serverIP=255.38.205.52 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.38.205.52","externalIp":"255.38.205.52","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=255.38.205.52 ::: serverIP=255.38.205.52 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: tor-exit-13.zbau.f3netze.de messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: tor-exit-13.zbau.f3netze.de severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-05T21:45:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Command and ControlPersonal Sites streamName: OpenDNS Detection clientIP: 255.38.205.52 serverIP: 16.45.68.149 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"16.106.18.225","externalIp":"16.106.18.225","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=16.106.18.225 ::: serverIP=16.106.18.225 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"16.106.18.225\",\"externalIp\":\"16.106.18.225\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=16.106.18.225 ::: serverIP=16.106.18.225 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-04T13:28:26.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "16.106.18.225", "serverIP": "216.97.195.98", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"16.106.18.225","externalIp":"16.106.18.225","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=16.106.18.225 ::: serverIP=16.106.18.225 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"16.106.18.225","externalIp":"16.106.18.225","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=16.106.18.225 ::: serverIP=16.106.18.225 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-04T13:28:26.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 16.106.18.225 serverIP: 216.97.195.98 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"151.237.246.109","externalIp":"151.237.246.109","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=151.237.246.109 ::: serverIP=151.237.246.109 ::: userName=charlie ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"151.237.246.109\",\"externalIp\":\"151.237.246.109\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=151.237.246.109 ::: serverIP=151.237.246.109 ::: userName=charlie ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-04T13:28:26.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "151.237.246.109", "serverIP": "28.191.85.1", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"151.237.246.109","externalIp":"151.237.246.109","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=151.237.246.109 ::: serverIP=151.237.246.109 ::: userName=charlie ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"151.237.246.109","externalIp":"151.237.246.109","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=151.237.246.109 ::: serverIP=151.237.246.109 ::: userName=charlie ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-04T13:28:26.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 151.237.246.109 serverIP: 28.191.85.1 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"36.124.6.208","externalIp":"36.124.6.208","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=36.124.6.208 ::: serverIP=36.124.6.208 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"36.124.6.208\",\"externalIp\":\"36.124.6.208\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=36.124.6.208 ::: serverIP=36.124.6.208 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-04T13:28:26.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "36.124.6.208", "serverIP": "111.163.9.217", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"36.124.6.208","externalIp":"36.124.6.208","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=36.124.6.208 ::: serverIP=36.124.6.208 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"36.124.6.208","externalIp":"36.124.6.208","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=36.124.6.208 ::: serverIP=36.124.6.208 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-04T13:28:26.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 36.124.6.208 serverIP: 111.163.9.217 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"50.111.185.107","externalIp":"50.111.185.107","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=50.111.185.107 ::: serverIP=50.111.185.107 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"50.111.185.107\",\"externalIp\":\"50.111.185.107\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=50.111.185.107 ::: serverIP=50.111.185.107 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-04T13:28:26.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "50.111.185.107", "serverIP": "31.124.46.32", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"50.111.185.107","externalIp":"50.111.185.107","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=50.111.185.107 ::: serverIP=50.111.185.107 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"50.111.185.107","externalIp":"50.111.185.107","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=50.111.185.107 ::: serverIP=50.111.185.107 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-04T13:28:26.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 50.111.185.107 serverIP: 31.124.46.32 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"48.97.220.138","externalIp":"48.97.220.138","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=48.97.220.138 ::: serverIP=48.97.220.138 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"48.97.220.138\",\"externalIp\":\"48.97.220.138\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=48.97.220.138 ::: serverIP=48.97.220.138 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-03T00:33:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "48.97.220.138", "serverIP": "157.17.61.38", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"48.97.220.138","externalIp":"48.97.220.138","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=48.97.220.138 ::: serverIP=48.97.220.138 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"48.97.220.138","externalIp":"48.97.220.138","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=48.97.220.138 ::: serverIP=48.97.220.138 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-03T00:33:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 48.97.220.138 serverIP: 157.17.61.38 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"46.80.211.166","externalIp":"46.80.211.166","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=46.80.211.166 ::: serverIP=46.80.211.166 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"46.80.211.166\",\"externalIp\":\"46.80.211.166\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=46.80.211.166 ::: serverIP=46.80.211.166 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-03T00:33:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "46.80.211.166", "serverIP": "191.105.146.212", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"46.80.211.166","externalIp":"46.80.211.166","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=46.80.211.166 ::: serverIP=46.80.211.166 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"46.80.211.166","externalIp":"46.80.211.166","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=46.80.211.166 ::: serverIP=46.80.211.166 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-03T00:33:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 46.80.211.166 serverIP: 191.105.146.212 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"71.86.117.214","externalIp":"71.86.117.214","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=71.86.117.214 ::: serverIP=71.86.117.214 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"71.86.117.214\",\"externalIp\":\"71.86.117.214\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=71.86.117.214 ::: serverIP=71.86.117.214 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-03T00:33:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "71.86.117.214", "serverIP": "236.97.201.53", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"71.86.117.214","externalIp":"71.86.117.214","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=71.86.117.214 ::: serverIP=71.86.117.214 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"71.86.117.214","externalIp":"71.86.117.214","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=71.86.117.214 ::: serverIP=71.86.117.214 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-03T00:33:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 71.86.117.214 serverIP: 236.97.201.53 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"39.108.228.106","externalIp":"39.108.228.106","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=39.108.228.106 ::: serverIP=39.108.228.106 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"39.108.228.106\",\"externalIp\":\"39.108.228.106\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=39.108.228.106 ::: serverIP=39.108.228.106 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-03T00:33:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "39.108.228.106", "serverIP": "36.124.87.176", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"39.108.228.106","externalIp":"39.108.228.106","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=39.108.228.106 ::: serverIP=39.108.228.106 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"39.108.228.106","externalIp":"39.108.228.106","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=39.108.228.106 ::: serverIP=39.108.228.106 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-03T00:33:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 39.108.228.106 serverIP: 36.124.87.176 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"148.215.240.65","externalIp":"148.215.240.65","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=148.215.240.65 ::: serverIP=148.215.240.65 ::: userName=janedoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"148.215.240.65\",\"externalIp\":\"148.215.240.65\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=148.215.240.65 ::: serverIP=148.215.240.65 ::: userName=janedoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-04T13:28:26.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "148.215.240.65", "serverIP": "48.60.19.204", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"148.215.240.65","externalIp":"148.215.240.65","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=148.215.240.65 ::: serverIP=148.215.240.65 ::: userName=janedoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"148.215.240.65","externalIp":"148.215.240.65","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=148.215.240.65 ::: serverIP=148.215.240.65 ::: userName=janedoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-04T13:28:26.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 148.215.240.65 serverIP: 48.60.19.204 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"171.184.160.184","externalIp":"171.184.160.184","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=171.184.160.184 ::: serverIP=171.184.160.184 ::: userName=fish ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"171.184.160.184\",\"externalIp\":\"171.184.160.184\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=171.184.160.184 ::: serverIP=171.184.160.184 ::: userName=fish ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-04T13:28:26.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "171.184.160.184", "serverIP": "21.18.116.46", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"171.184.160.184","externalIp":"171.184.160.184","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=171.184.160.184 ::: serverIP=171.184.160.184 ::: userName=fish ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"171.184.160.184","externalIp":"171.184.160.184","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=171.184.160.184 ::: serverIP=171.184.160.184 ::: userName=fish ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-04T13:28:26.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 171.184.160.184 serverIP: 21.18.116.46 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"93.114.57.21","externalIp":"93.114.57.21","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=93.114.57.21 ::: serverIP=93.114.57.21 ::: userName=bob ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"93.114.57.21\",\"externalIp\":\"93.114.57.21\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=93.114.57.21 ::: serverIP=93.114.57.21 ::: userName=bob ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-04T13:28:26.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "93.114.57.21", "serverIP": "84.49.126.168", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"93.114.57.21","externalIp":"93.114.57.21","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=93.114.57.21 ::: serverIP=93.114.57.21 ::: userName=bob ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"93.114.57.21","externalIp":"93.114.57.21","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=93.114.57.21 ::: serverIP=93.114.57.21 ::: userName=bob ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-04T13:28:26.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 93.114.57.21 serverIP: 84.49.126.168 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"15.100.204.133","externalIp":"15.100.204.133","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=15.100.204.133 ::: serverIP=15.100.204.133 ::: userName=johndoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"15.100.204.133\",\"externalIp\":\"15.100.204.133\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=15.100.204.133 ::: serverIP=15.100.204.133 ::: userName=johndoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-04T13:28:26.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "15.100.204.133", "serverIP": "142.150.244.118", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"15.100.204.133","externalIp":"15.100.204.133","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=15.100.204.133 ::: serverIP=15.100.204.133 ::: userName=johndoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"15.100.204.133","externalIp":"15.100.204.133","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=15.100.204.133 ::: serverIP=15.100.204.133 ::: userName=johndoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-04T13:28:26.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 15.100.204.133 serverIP: 142.150.244.118 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"42.202.22.128","externalIp":"42.202.22.128","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=42.202.22.128 ::: serverIP=42.202.22.128 ::: userName=nighthawk ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"42.202.22.128\",\"externalIp\":\"42.202.22.128\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=42.202.22.128 ::: serverIP=42.202.22.128 ::: userName=nighthawk ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-03T00:33:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "42.202.22.128", "serverIP": "0.191.83.50", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"42.202.22.128","externalIp":"42.202.22.128","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=42.202.22.128 ::: serverIP=42.202.22.128 ::: userName=nighthawk ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"42.202.22.128","externalIp":"42.202.22.128","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=42.202.22.128 ::: serverIP=42.202.22.128 ::: userName=nighthawk ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-03T00:33:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 42.202.22.128 serverIP: 0.191.83.50 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"68.227.4.20","externalIp":"68.227.4.20","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=68.227.4.20 ::: serverIP=68.227.4.20 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"68.227.4.20\",\"externalIp\":\"68.227.4.20\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=68.227.4.20 ::: serverIP=68.227.4.20 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-03T00:33:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "68.227.4.20", "serverIP": "126.226.144.208", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"68.227.4.20","externalIp":"68.227.4.20","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=68.227.4.20 ::: serverIP=68.227.4.20 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"68.227.4.20","externalIp":"68.227.4.20","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=68.227.4.20 ::: serverIP=68.227.4.20 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-03T00:33:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 68.227.4.20 serverIP: 126.226.144.208 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"201.181.150.188","externalIp":"201.181.150.188","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=201.181.150.188 ::: serverIP=201.181.150.188 ::: userName=alice ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"201.181.150.188\",\"externalIp\":\"201.181.150.188\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=201.181.150.188 ::: serverIP=201.181.150.188 ::: userName=alice ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-03T00:33:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "201.181.150.188", "serverIP": "128.190.69.31", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"201.181.150.188","externalIp":"201.181.150.188","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=201.181.150.188 ::: serverIP=201.181.150.188 ::: userName=alice ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"201.181.150.188","externalIp":"201.181.150.188","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=201.181.150.188 ::: serverIP=201.181.150.188 ::: userName=alice ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-03T00:33:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 201.181.150.188 serverIP: 128.190.69.31 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"96.145.124.75","externalIp":"96.145.124.75","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=96.145.124.75 ::: serverIP=96.145.124.75 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"96.145.124.75\",\"externalIp\":\"96.145.124.75\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=96.145.124.75 ::: serverIP=96.145.124.75 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-03T00:33:58.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "96.145.124.75", "serverIP": "121.77.85.230", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"96.145.124.75","externalIp":"96.145.124.75","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=96.145.124.75 ::: serverIP=96.145.124.75 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"96.145.124.75","externalIp":"96.145.124.75","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=96.145.124.75 ::: serverIP=96.145.124.75 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-03T00:33:58.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 96.145.124.75 serverIP: 121.77.85.230 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.39.171.209","externalIp":"255.39.171.209","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=255.39.171.209 ::: serverIP=255.39.171.209 ::: userName=nighthawk ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"255.39.171.209\",\"externalIp\":\"255.39.171.209\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:27:47.000Z\"} ::: clientIP=255.39.171.209 ::: serverIP=255.39.171.209 ::: userName=nighthawk ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-04T13:27:47.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "255.39.171.209", "serverIP": "74.67.150.38", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.39.171.209","externalIp":"255.39.171.209","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=255.39.171.209 ::: serverIP=255.39.171.209 ::: userName=nighthawk ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.39.171.209","externalIp":"255.39.171.209","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=255.39.171.209 ::: serverIP=255.39.171.209 ::: userName=nighthawk ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-04T13:27:47.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 255.39.171.209 serverIP: 74.67.150.38 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"38.187.98.73","externalIp":"38.187.98.73","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=38.187.98.73 ::: serverIP=38.187.98.73 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"38.187.98.73\",\"externalIp\":\"38.187.98.73\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:27:47.000Z\"} ::: clientIP=38.187.98.73 ::: serverIP=38.187.98.73 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-04T13:27:47.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "38.187.98.73", "serverIP": "200.70.84.25", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"38.187.98.73","externalIp":"38.187.98.73","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=38.187.98.73 ::: serverIP=38.187.98.73 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"38.187.98.73","externalIp":"38.187.98.73","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=38.187.98.73 ::: serverIP=38.187.98.73 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-04T13:27:47.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 38.187.98.73 serverIP: 200.70.84.25 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"221.114.33.43","externalIp":"221.114.33.43","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=221.114.33.43 ::: serverIP=221.114.33.43 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"221.114.33.43\",\"externalIp\":\"221.114.33.43\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:27:47.000Z\"} ::: clientIP=221.114.33.43 ::: serverIP=221.114.33.43 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-04T13:27:47.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "221.114.33.43", "serverIP": "59.0.197.205", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"221.114.33.43","externalIp":"221.114.33.43","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=221.114.33.43 ::: serverIP=221.114.33.43 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"221.114.33.43","externalIp":"221.114.33.43","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=221.114.33.43 ::: serverIP=221.114.33.43 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-04T13:27:47.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 221.114.33.43 serverIP: 59.0.197.205 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"194.16.84.189","externalIp":"194.16.84.189","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=194.16.84.189 ::: serverIP=194.16.84.189 ::: userName=fish ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"194.16.84.189\",\"externalIp\":\"194.16.84.189\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:27:47.000Z\"} ::: clientIP=194.16.84.189 ::: serverIP=194.16.84.189 ::: userName=fish ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-04T13:27:47.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "194.16.84.189", "serverIP": "214.60.222.147", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"194.16.84.189","externalIp":"194.16.84.189","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=194.16.84.189 ::: serverIP=194.16.84.189 ::: userName=fish ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"194.16.84.189","externalIp":"194.16.84.189","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=194.16.84.189 ::: serverIP=194.16.84.189 ::: userName=fish ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: blue2.census.shodan.io messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: blue2.census.shodan.io severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-05-04T13:27:47.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals streamName: OpenDNS Detection clientIP: 194.16.84.189 serverIP: 214.60.222.147 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"50.210.142.143","externalIp":"50.210.142.143","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:48.000Z"} ::: clientIP=50.210.142.143 ::: serverIP=50.210.142.143 ::: userName=johndoe ::: created_at=2022-05-04T13:27:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:48.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "blue2.census.shodan.io", "message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"50.210.142.143\",\"externalIp\":\"50.210.142.143\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:27:48.000Z\"} ::: clientIP=50.210.142.143 ::: serverIP=50.210.142.143 ::: userName=johndoe ::: created_at=2022-05-04T13:27:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:48.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "blue2.census.shodan.io", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-05-04T13:27:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals", "streamName": "OpenDNS Detection", "clientIP": "50.210.142.143", "serverIP": "106.29.46.143", "userName": "johndoe" }
Create a JSON artifact from the message